Computers & Technology - Boddunanhttps://www.boddunan.com/topics/computers-and-technology.html
Wed, 19 Dec 2018 10:25:57 +0000Joomla! - Open Source Content Managementen-gbnoreply@boddunan.com (Information Creates Wealth)https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25396
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25396In today’s changing online technical world, privacy is rare. If you do not want to share your information with strangers on the internet, then you have to actively take steps to protect your privacy.

In this post, we will learn how to remove your name and number from the True Caller directory.

What is True Caller

True Caller is a free smartphone Application. Almost everyone installs True Caller in their phones. This app shows you the name and location of the person calling on your phone. But sometimes we do not want to disclose our identity and do not want someone to know your name. This post will be able to solve your dilemma.

By following these steps you would be able to remove your name from True Caller directory.

First of all, if you have already installed the True Caller app on your smartphone then deactivate that account because True Caller would display the name of the account. Make sure you deactivate the account and not uninstall it. Uninstalling would not solve anything, your name and number would still be registered in True Caller app.

Make sure you deactivate the account and not uninstall it. Uninstalling would not solve anything, your name and number would still be registered in True Caller app.

Steps to remove your name

Go to the setting menu of True Caller and click About.

In that list, you would see the option to Deactivate.

When you click Deactivate, True Caller would ask for a confirmation. You have to click Yes. After that, your account would become deactivated. Now that your account is deactivated, you could uninstall True Caller app from your mobile.

If you don’t have a True Caller app in your mobile then you have to go to the official website of True Caller and 'Unlist' your name there. You can search the link for that on Google.

On their official website, you have to enter your mobile number that you want to remove from True Caller list. Then it will ask you a reason for that. You would see different options for the reasons why you want to remove your number from True Caller app. Click on all of them and click Unlist. After entering the details the Unlist option would be highlighted.

After completing this step wait for two minutes and then search your number. It won’t show your name.

For your information, I want to tell you True Caller app reads all your contact information after installation. After that, the names and numbers of your contact list will be saved in True Caller directory. When someone would search that number the name that you entered in your contact detail would be displayed.

]]>abhishek_88dass@yahoo.in (Abhishek Dass)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25390
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25390YouTube is the most popular video-sharing site in the world.

All the latest movie trailers and songs are released on YouTube first before it is aired on TV. So if you want to catch the latest movie trailer you would go to YouTube.

Another great feature of YouTube is that you could also upload your favorite videos and share it with the world.

But you could use all these features of YouTube when you have a high-speed internet connection. A good internet speed ensures that you have an amazing viewing experience on YouTube.

But when the buffering speed of the video is slow or when it takes a long time to load, then it gets very irritating.

When you are watching an exciting video and if it stops in between and starts buffering, then it ruins the whole experience of watching that video.

But there are some tricks and hacks to solve this problem. So let us learn how to increase the speed of YouTube.

Factors that affect the speed of YouTube

The first and obvious factor is your internet speed. The buffering speed of YouTube is directly dependent on your internet speed.

The second factor is your computer hardware. If your computer runs on an old hardware configuration, then it may also affect your buffering speed.

How to increase the buffering speed of YouTube up to 20%

1. Block the IP address used by CDN networks

Content Delivery Networks is a system through which different networks deliver a website, based on your geographical location.

The videos on YouTube are delivered by US-based servers, where the information was stored.

When you watch videos through different servers, it affects YouTube buffering speed. So you should block the different IP addresses used by CDN networks.

2. Use the DNS (Domain Name Server) of YouTube

You could increase the buffering speed of YouTube if you use the internet connection through a separate DNS connection.

To do this, first, you have to go to control panel and choose Network Connections. Now here you have to choose Properties. In the properties, go to the menu and choose Internet Protocol.

Open DNS addresses and insert the number of new DNS server. (You could search it on Google.)

3. Use SpeedBit Video Accelerator

SpeedBit Video Accelerator is an excellent software to increase the buffering speed of YouTube.

This will also increase your overall internet speed as well. You can download the free version of this software.

4. Clear the cache data

You should regularly clear your old cache and browsing data, such as history, passwords etc; so that your internet speed is not affected.

There are software available on the internet that would regularly delete your unwanted and old browsing data. You could just search it on Google.

5. Change the video quality

To increase the speed of YouTube, you could change the quality of the video.

You could change the high-quality videos to low quality like 360p or 240p.

6. Close the Ads on YouTube

While watching a video, when an ad suddenly pops up, it could reduce the speed of your video. You could install a plug-in that would stop the ads on YouTube. Adblocker is an excellent option.

7. Update your Browser

You should regularly update your web browser. It is a very important factor that would help in increasing YouTube speed.

So these are some of the few simple tips and tricks that would help you increase the speed of YouTube and enable you to have a better viewing experience.

I hope you will use them to improve the buffering speed of YouTube videos.

It all ultimately depends on your internet speed but using these methods you could at least increase your default speed by 20%.

]]>abhishek_88dass@yahoo.in (Abhishek Dass)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25201
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25201The world is becoming a smaller place day by day. Thanks to internet. We are very close to the people all around world and also have the option to directly connect to anyone in the world with a click using WhatsApp or Skype or other similar applications. The traditional ways of communication and marketing have undergone a phenomenal transformation with the advent of the internet. Here we will talk amount how social media marketing is gaining ground and helping the small businesses to make more money with least monetary investments.

Pros

We are all very much aware of the advantages on usage of internet. Though it has made the people lethargic and that is the least to say. We have come to expect everything to happen with a click. The new breed of work force would not even think about going to a bank to deposit money. He would rather do all that online from the comfort of his own. Who would not give into the temptation of doing all banking chores, all your grocery shopping etc. right from your AC rooms. No parking problems, no traffic, no crowds.

Cons

But obvious is the fact that you do not get to touch and feel what you buy. There is no inter personal relationship online to start with. Online frauds are on the rise, your personal information is available online, you do not “see” the person you are dealing with are some other factors which are considered as deterrents to the online wave.

Having said that I would like to talk more about the marketing of products and services and how it is developing and flourishing in this new era. With so many new apps available is desktop and mobile versions, marketing has taken on new dimensions

WhatsApp

As of Feb 2016, WhatsApp has more than 1 billion users globally. Now this is very huge number. Add to that the fact the messages and video sharing is free (India). If we were to analyze any other marketing models like through TV, ads, newspaper etc. we can see that there is a monetary aspect. You need to pay to get listed. Also the audience is limited. WhatsApp unlike these, gives you the access to the targeted user base with no cost involved. Even if WhatsApp was to be made chargeable, the charges would be bare minimum compared to others. WhatsApp allows small businesses who cannot hire a dedicated marketing team or software to expand its user base. There are no time limits here, no deadlines.

Facebook

Next best marketing tool today is Facebook. Unlike WhatsApp this platform allows real time communication between people. It also has the provisions to create pages, groups and shops to cater to the marketing needs of small businesses. It allows you to boost certain pages and groups with minimal monetary input. You have the flexibility and the freedom to create your own online store and show case your products. Once that is done, you just need to drive the traffic to your store. This again does not need a dedicated marketing team or software, any individual with interest and flare can do the job well. Facebook with its in build chatting feature, allows prospective buyers and sellers to “talk” to each other and negotiate. With both the buyer and seller having an individual profile also helps both parties to understand and judge each other better.

Twitter

This is another powerful platform. Twitter has mostly the elite cream of the market users. Here also its pretty easy to create brand of your own and publicize it or drag traffic to it. You can tweet and retweet your products and services to the targeted client base. You can start up discussions and forums. Hashtags are another very powerful and popular twitter tool. It can be used to create publicity streams and trends.

Housewives - Small and very small businesses

The section of the people who have most benefited from these social marketing have been the housewives with small and very small businesses. The number of housewives entering into home based initiatives are increasing day by day. They have businesses relating to clothes, accessories, food, gift items etc. You name it and they have it. This is a powerful means of providing the much needed financial independence to those who are unable to go out and work due personal and other reasons. With the help of these platforms they are able to create a client base spanning across cities, countries and even continents and this is not an exaggeration.

With the growing use of internet and its expanding user base, it is very likely to be the next big in thing in marketing and sales. In future also we should expect more such tools to come up which make the life of the marketing people easier and the competition more tough. And in the end as always the customer would be the real winner

]]>div_yaa123@yahoo.com (Divya)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25121
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=25121The first thing I do in morning is not to pray to God for another wonderful morning, or thank him for the two beautiful kids I have or plan for the day ahead or think about my health and do some exercise or yoga. The first thing I do is switch on the Wi-Fi and see the number of messages I have in WhatsApp. I may or may not read them immediately but then I cannot start my day without doing this chore religiously. It’s an addiction, the addiction to technology. There are so many groups and so many people (sorry friends) who keep posting forward messages or discuss some topic just like in any other forum. But when I need a friend, do I have any of these virtual people around?

Addiction

The addiction does not end with just getting up and checking the messages. It lasts through the day. While having breakfast or lunch or dinner, while working in office, while helping my kids with their homework, the subtle presence is always there. The desire to know if there is a new message however irrelevant it may be. The desire to know the new gossips in the family groups. The desire to check the new DP (display pictures) or the new status. To know if I have been added in any more groups. Add to it the competition to create new supposedly “meaningful” groups and keeping it more active and “meaningful” than the groups started by others. Suddenly, I am like OMG (Oh my God) of all the addictions, did I have to fall prey to this WhatsApp? On a lighter but serious note, there is an unnamed disease, which is traced to excessive WhatsApp usage. Basically, only our thumb doing repeated scrolling and “touching” while the other fingers don’t move much. So dears, please do be careful and give your hands and fingers the much needed exercise in between please.

Information

But before you jump to a conclusion about this smaller version of the idiot box, let me tell you there are so many things which are so helpful and make it worthy of the time spent. A family group where the parents are in the native place, the son is in USA and daughter is in Chennai and they have kids. For all happy and sad occasions, you can share the pictures in the family groups. The grandparents will always be happy to see the kids the pictures and the videos because that’s the best they can have since they are unable to stay with new generation.

Similarly, my son misses school for a day. Immediately I post a message asking for homework and classwork done for that day in School Parents group and within minutes I have the screenshots being shared. No, the herculean task would be to make him do that homework.

As we move forward in life, our responsibilities increase, priorities change and the “me – time” is reduced. We seem to loose contact with our friends from college and school (yes we all had friends in school). But WhatsApp is a platform which has brought us all together again. A school friends or college friend’s group is just what is need to bring a smile to our face. A reminiscent of the good old days.

There have been instances where patients received appropriate blood donors through this wonder app. Some cases where lost people were also found with the news being spread faster through this app. But again things when in the hands of good people is safe, but the moment it falls in the hands of unscrupulous people it can create problems. So we all need to be careful and vigilant always.

My World

With everything said and done, WhatsApp continues to be a good time pass for me. Again the first thing I do in the morning is to check the messages, the gossips, the updates and the DPs.

]]>div_yaa123@yahoo.com (Divya)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24385
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24385Smartphones are no more a special thing for us. Almost all people have this smart device which is really helpful to us in many ways. Now it is no more ordinary phone like older days which was only used for calling and messaging purpose because now with smartphone we can do lots of different things than just calling. You can use it as alternative of camera, alternative of music player, alternative of video player and alternative of computer. Yes it can do almost all works for us.

These days technology has been improved lot. New technology has increased the use of these smartphones even more and with more efficiently. These days many new gadgets are getting introduced in the market which can make your smart phone experience even better. These gadgets can be attached with your smartphone and can enhance the performance of your smartphone to the next level. Now you can make your smartphone experience more powerful with these gadgets. Let’s see which gadgets are available in the market which can make your smart phones better. Here they are.

Smart watch

These days almost all big companies are launching smart watches for smartphones. Recently Apple has got huge success from their smart watch gadget so all companies are now following them. Smart watch can be attached with your android phone and can provide all important notifications to you. You don’t need to open phone for it. You can see all those notification directly from the smart watch. Different smart watches have different functionalities as per their price tag. Using some smart watches you can receive and make calls too. You can set see messages, other notifications like whatsapp, put alarms, to do notes and many more things using these smart watches. From somesmart phone you can access different applications too. You can directly install them on your smart watch. So now gadgets like smart watch can take your smartphone experience to the next level.

Fitness belts

These days many companies are launches fitness belts too. This is nothing but fitness regarding wrist belt. You just need to wear it on your hand and it can track all your workout activity for you. It can count your steps so that you can have your details after running or walking session. By this gadget you can easily know how much distance you have covered with which speed. This device also can track rope skipping detail for you. You can put alarms and reminders on it so that you can wake up on time and you don’t forget any of your work. These belts can also track your sleeping activity that how much you sleep and how well you sleep. You can see all collected data on your mobile via application related to that belt and analyze it. Such applications can also count calorie of your foods and make your diet chart as per your weight. Such applications can directly collect your workout data from the fitness belts, so that you can mix up your exercising data and diet chart to maintain your weight.

Heart regarding gadget

The technology has improved lot that it is really hard to believe that even small gadgets can do work of big machines. Just few days’ back ‘YU’ company has launched health related gadget for android smartphones which can record all data regarding your heart activity. In simple words it tracks your heart activity and can provide different charts. Using this gadget you can measure your blood pressure, heart rate, body temperature and many other heart related thing. And big one is that it can also take ECG (electrocardiogram) of your heart. Yes that is true. It is small device which can be attached with any android device. After attaching you just need to put your fingers on the cup and it can take your ECG in no time. Not only that after taking ECG it can send your ECG reports to your doctor instantly with just one click. So now it can save your big time. So for heart patients it is a very important gadget. With this gadget you can monitor your heart multiple times in a day and send the reports anytime to your doctor. So it is like life saving gadget. Such gadget can make your smartphone like medical kit.

Camera lens

This gadget is for camera lovers. Many people just love to take photographs using their smart phone. In short smart phones have decreased the use of actual camera for normal people. But sometime you may not found proper result with your phone. But with this gadget you can enhance the quality of your phone camera. Camera lens is an extra lens for your phone which can be fitted on back of your smartphone on the default camera. By attaching this extra lens to your phone you can have improved result of photographs you take from your phone. Not only that you can do much more clear zoom (depend on the attached lens) result after attaching this extra lens. So if you want to have professional pictures or quality pictures from your phone then you can go for this gadget. It is very small in size, so you can easily carry it with you anytime.

Power banks

Poor battery is very common problem for every people regarding smartphone. But this is because your heavy usage and apps you installed on your phone. Well, I don’t want to talk on that. Power banks are small gadgets which are portable charger for your smartphone. This is really handy gadget. You just need to fully charge this power bank and carry it with you, whenever your phone’s battery is discharged then you can connect this power bank with your phone and it will start charging your phone at a time. Means it is like having double battery with you. Let me tell you in market there are power banks available with big battery backup. Such power bank can charge your phone multiple times. Such gadget can be really handy during traveling time. You can’t put your phone for charging with charger during traveling. But this gadget can solve your problem. This gadget is very small in size, so you can easily carry it with you anytime.

Bluetooth speakers

This is also known gadget like power bank I mentioned above. But this is really helpful for all music lovers. In market there are Bluetooth speakers available which can be attached with your smartphone that can raise voice and quality of your phone’s music with help of that extra speaker. You just need to connect your smartphone using Bluetooth and choose it as your default speaker form your phone. It will start working for you instantly. These Bluetooth speakers are very compact and portable that you carry them anywhere. You can also put it in your car instead of your car’s tape and hear your favorite music from your phone. As I said they are small in size but let me tell you, it will give you quality sound with good voice too. So for all music lovers this is really handy gadget related with your smartphone.

Wireless keyboards

I don’t need to tell that people just loves to do social networking stuff from their phone. In fact this is the most common thing which used by almost all smart phone users. Either whatsapp and facebook or any other social networking thing, people just love to do it from their phones. But for them they need to type lot. Some people are smarter enough in it and some of them found it bit harder. No worry. There are wireless keyboard available for your smartphone which can be connected through Bluetooth to your phone and can be use it as default typing method. Means you can type on your phone using that wireless keyboard after attaching it with your smartphone. This can really enhance your typing experience and speed of typing on your smartphone.

So this is it. These are the gadgets which can connect with your smartphone to make it performance better. Each one has different functionalities. They can be attached to your phone in different manner to improve different section of your smartphone. So if you too want to have few gadgets to make your smartphone experience better then go for it.

Image from: wikipedia

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24382
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24382Smartphone world is getting bigger and bigger in shape. They have so many new things and features to offer that they keep launching new and new smartphones. So many new companies have already entered in to the market and with all of them we are like having new phones almost every day. A person purchases a smartphone of any company and just after couple of week new smartphone with better features and price gets introduced. So it is like huge competition is going on between the companies. That is why it has become even more confusing that for which brand we should go for.

Many people has craze to only go for branded mobiles. Even they have to pay higher just because of brand they only purchase branded phone with very high cost. If we consider specifications and features, same phone is available in the market with very less price in compare to that branded phone with less popular brand. They why should we go for branded phone. Is it worth? Everything has advantages and disadvantages both. Let’s first learn about both for branded phones and then discuss about that question.

Advantages of Branded smartphones

Quality Assurance: It is obvious thing with most of the branded thing. You are paying well to them so you will get the quality product in most of the cases. You will be satisfied in probably all section as per cost of your phone. You will get better camera, better calling function, better sound and many more. That doesn’t mean that less popular brand not provide quality product. But quality assurance is stronger in branded things.

Service satisfaction: Most of the branded phones having more service centers in different cities. So you will get better service for your phones with branded smartphones. This advantage is important one. For minor bugs also some companies take too much time to solve and that also with less satisfaction job. But with better branded smart phones you will get assurance of better service too. They will provide you quality service for repairing and exchanging purpose.

Disadvantages of Branded smartphones

The only disadvantage I found is price of product. They take really high price of the phone just because of popular brand. This thing is important too as with less popular brand you will get phone with same specifications and features at really low cost. With that cost you can almost purchase two less popular branded phones for you. Plus these days even less popular brand phones with less cost are offering good service at their service center.

So these are the advantages and disadvantages of branded smart phones. But it is still really hard to tell either one should go for branded phone or not. Honestly it is depend on person’s usage and reason for using the smart phone. I mean I have seen lot of people who just purchase branded phone because of status thing. They think that branded phone makes their status higher. So it is depend on person too.

Personally I am not brand lover. I look for decent phone which satisfy my usage with less price. Yes I don’t want to spend extra money just because of brand thing if I can get the phone in very less price. I look phone’s specification and features which I can get with less popular brand too. I just need to look the phone’s specification and little about company which provide okay service. But this is about me. Let’s face question now.

Is branded phones worthy enough?

For me, no they are not. These days many Chinese companies have put their smartphone business in the market. And honestly they are giving most quality smart phones in very less price. Not only that they are also offering decent service options. If you will survey smart phone market on the internet then you will see that new Chinese company’s phones are most popular now. They are getting the highest buyers than any old and famous company. Obviously they are providing very good features and hardware in very low cost with good service. Then why should we go for spending more money. Not only Chinese companies these days local Indian companies are also manufacturing decent smartphones in very good price range. After our PM’s ‘Make in India’ project many Indian companies are heading up for making such gadgets in India directly which really put down the cost for customers.

So honestly my personal opinion is we shouldn’t go for branded thing. Survey yourself and go for best. If the phone is providing enough features as per your usage and you are getting in low budget then why you should spend more money on it. These are the factors you should look when you purchase your new phone.

Things you should look during purchasing smartphone

Processor and RAM: This is about speed of the phone. If you want fast performance from your phone then you should check out these two things. I am not telling you should go for phone which has biggest processor and RAM. Just check both of them if they are enough for your personal use then it is okay for you. Normally quad core processor with 1GB RAM is enough for general use for any kind of person. If you still want more speed then go for 2GB RAM.

Camera: These days’ people love to take photos from their phone. As we keep phone every time with us we can take photos of our each and every moment. So having good camera is important. If you are also one of those who love to take photographs then just take care of camera stuff when you are purchasing new phone.

Battery: This thing is most important for me at least. People don’t check out the battery of the phone when they are purchasing it. Behind the box of phone you can check out ‘MAH’ of battery of phone. If those numbers are high then your phone will give more battery backup. Normally these days if phone’s battery is 2000mah or above then it can give you enough power for normal use. If your usage is very high then better you choose the phone with better battery power.

Display: If you want quality display then you should check out the PPI (pixel per inch) of any phone. Normally it is not available on the box of phone. But you can check it out on internet for any phone. Phone with more PPI numbers can provide you better display. Normally PPI near to 250 or above are good enough for any phone. Also if you want more clearly display then go for AMOLED display which can provide better color production for you. Also go for HD or full HD display which can give you clear result. HD display can provide you more PPI. You should also checkout the quality of glass on your phone. Gorilla glass protection can give you scratch proof glass.

Network: In India, 4G network is almost very near. So if you love to browse internet fast then better your go for phone with 4G enabled. At least go for 3G enabled phones as you can have fast internet on 3G as well.

So this is it. Brand thing is disappearing in compare to past. These days almost all people want more good specifications and features in good price range. Budget is important for everyone. That is different thing to go for any famous phone if you have bigger budget to spend. I have already explained about features of phone, following it you can easily know that of which specification phone you required. So buy the phone as per requirement not just for show off. Still choice is yours. These days we have so many new phones in the market which can make person confuse in no time.

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24354
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24354Android is open source operating system. So if you know about developing stuff then you can root your android phone and install different custom ROMs on your phone to get more features. You can know all information about custom ROMs from my previous article regarding custom ROMs. People always think that custom ROMs are not that great as they are not stable, they provide more features but with that they also provide so many errors. But that’s not true. There are so many custom ROMs available for different devices and among them few are really superb and famous. And CynogenMod custom ROM is one of them.

CynogenMod is the custom ROM which is quite popular as it provides so many customization features that are not available on default android operating system. It can make your phone more interesting for sure. This ROM will never let you make bored from your phone. Let me tell you that not for all devices this custom ROM is available. If your device is famous and lucky then it may be available for it. You can search on the internet if this custom ROM available for your device or not. Now let’s learn about the features of this custom ROM which make it unique from others.

CynogenMod features and fuctions

Theme Engine

Default android operating system is not having any kind of theme option on it, just boring and same system. That’s why on default system you may get easily bored after using it for certain time. You can change the user interface by downloading different launchers but that is also boring as users are not comfortable same with all launchers. But CynogenMod custom ROM has its own theme engine. This theme engine application of this ROM is really quite popular all over the world and you may easily find out different themes for free on Google play store. Let’s learn what changes you can make using this theme engine on your android phone.

Icons: This theme engine can change the icons of your android phone. You can use different icons with different themes as you like.

User interface: This theme engine can change whole user interface of your android phone as per theme. This user interface includes notification area, setting page, status bar, navigation bar, etc. By changing theme you will find changes in all areas I mentioned above as per theme.

Sounds: Some themes also include sounds section. So you will also found the change in ringtone for call, notification tone and alarm tone as per theme.

Wallpaper: This theme engine will also change the wallpapers as per theme. You will get multiple wallpapers if theme contains more. With this theme engine you can choose separate wallpapers for lock screen and home screen.

Fonts: This theme engine can also change the fonts of your android system. By changing font on your phone you will found change in fonts at every place on your phone.

Boot Animation: This is something unique. This theme engine is like all rounder. It can also change boot animation of your phone. If you have Xperia theme downloaded on your phone then you will get boot animation of Xperia phone at the booting time. This is something amazing.

This ROM has gained so much popularity just because of its theme engine. You can change the look of your phone completely as you like. Just try it and you will understand what I am talking about.

Managing Tiles in Quick settings and Customizing notification bar

On the notification area we are having quick settings option on android phone. Using this area we can toggle different functions like wifi, Bluetooth, data connection, GPS, etc. On default android system unfortunately you have to satisfy yourself with the available functions only. I mean you can’t add or delete any toggle from the list. But on this custom ROM there is a feature using which you can manage this area. Yes, you can add new tiles and remove them as you like. You can arrange the quick settings area as your choice. So this customization feature is quite helpful for those who play more with quick settings option.

You can also customize notification bar from this custom ROM. As I mentioned above you can add tiles on quick settings on notification bar. With that there are also other customizing functions available. You can add widgets like weather on notification area. You can also enlarge first row of quick settings so that you can reach to your important toggles faster by putting them on first raw. So customize your phone for easy use.

Status bar customization

There are many options available to customize status bar on this custom ROM which are surely missing on stock android system.

Clock: In lollipop version there is no am/pm options available for status bar clock. But here you can enable this option. Here you can also change the position of clock on the status bar. You can put the clock at center, left, right and you can also hide it from the status bar. On stock android system clock always available at right corner on status bar.

Battery icon: With this custom ROM you can change battery icon available on status bar. You can also hide the icon from it. You can enable percentage mode option on this ROM.

Brightness Control: On this custom ROM there is one feature named brightness control. By turning it on you will get the option to control the brightness of your phone by sliding your finger left or right on status bar. Means you can increase and decrease the brightness by just sliding your finger left or right on status bar.

Customizing Buttons

Form this area you can customize different buttons like power button, home button, navigation bar and many more. Let’s check it out.

Navigation Bar: Navigation bar means those soft buttons which are on screen buttons using which you can go back and home. You can customize the buttons using this option. You can add more buttons to navigation bar using this option so that more functions can be access directly from navigation bar area. Not only that there is also left handed mode available for left hander users. From here you can also change function of navigation ring.

Power Button: By pressing power button normally you only get option for switching off your phone. But from here you can have more option on power menu. You can have reboot, screenshot, airplane mode, etc. features on power menu screen when you press the power button. Means power button now can do more things than just switching off your phone.

Volume buttons: You can also change the functionality of volume controller buttons as per you like by this option.

Other customization options

Above I explain many important customization options. But there are many small ones too. In normal stock ROMs you won’t find clear all button on recent app window. But here it is available. You can now manage SIM cards more easily with extra features available on this ROM. You will also found many small display features as addition. You will found more columns and rows on menu window on this custom ROM. On this ROM you will found file manager application which have extra features than normal.

So this is it. I guess I have explained almost. In sort CynogenMod custom ROM is all about customizing your phone. Here you will have so many customizing options available using which you can make your phone just like you want. Those features can make your phone easier to use for you. Try yourself to know more about it.

I have heard lot about this custom ROM in past. I have android one smart phone and just recently installed this custom ROM on my phone. So I just wanted to share my experience with you all. As per me this is the best custom ROM you can ever have. Best of luck.

Images Source: MySelf

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24329
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24329Privacy is an important thing in every section. Same goes for mobile phones too. People always have something to hide from others on their mobile phone like photos, files, videos and many more. Well, I am not talking about rubbish things and in the wrong way. With latest smart phones, you can have many important things that you don’t want to share to certain people. And these days I have seen that many people have habit of peeping out the gallery of other person’s mobile phone. Sometimes they also check other private stuffs on others phone which I really hate. So this is wrong and it is necessary to stop it somehow. Sometimes we don’t want others to checkout our private moment and stuffs on our mobile phones. And because of some reasons and our nature we can’t directly tell them to stay away from our mobile. So what to do…? If you have android phone then I have some super ideas and apps for hiding your private things that nobody except you can check out your stuffs on your mobile phone. Let’s learn about how you can hide your things on your android phone.

Make invisible folder on your Android phone

You know you can invisible folders on your android phone. Yes it is true. And for that you don’t even need any third party application. You just required a file manager, and I recommend ES file explorer app for the same. Everybody knows that using file manger we can make new folders for managing our files. But if you will make new folder and name it start with “.”, for example, ‘.photos’ or ‘.videos’, then such folder will be invisible automatically. You can only see them in file explorer and that also when you have on the feature of ‘show hidden files’. If you will put any photos and videos in these folders then those photos and videos will be not visible in the gallery of your phone. This is very easy way to hide anything on your android phone. Just put ‘dot’ in front of any folder name to hide that folder items. And just remove that ‘dot’ from the name and that folder will be un-hide automatically.

Hide Pictures application

There is application on play store named Hide Pictures using which you can hide your stuffs on your android phone. This application available free on Google playstore, just search its name to download it. Good thing I liked about this application is that after installation the name of this application appears on the menu of your phone as ‘Audio Manager’. Not only that when anyone start that application by chance they will only able to see few audio controls on it as its name suggest. There is a hidden way to go to your hidden stuff from this application. The way you will automatically find out when you open application first time on your phone. I don’t want to reveal all those things here. Let’s talk about what features are offered by this application.

Hide messages: Using this application you can actually hide you text messages. Yes that is not offer by many applications. But using this one you can hide your SMS.

Hide applications: Not only your medias and files, you can hide whole applications too using this application. Just hide the applications that you don’t want to show your friends and relatives when you share your phone with them. But for using this function you must have rooted android phone. You can read more about rooted android phone on the internet.

Other media files: Above things were unique and different. But like other applications this application also provides option for hiding media files. You can hide and unhide videos from gallery on your android phone. Using this application you can also hide and unhide photos from the gallery. Not only that you can also manage videos and images by creating folder inside this application. You can also hide audio files on this application like photos and videos.

So in short this is like complete package to make your stuff private on your android phone. This application has provided all the stuffs you required to hide you files and other things on your phone. If you are also concern about privacy stuff on your android phone then this application is worth trying.

Lockdown Pro application

This application is also one of my favorite. Using this application you can lock down applications on your android phone. You can lock applications like whatsapp, gallery, facebook, etc so that no one without your permission can open it. So you can hide your stuff from your friends and relatives. This application provides pattern lock and password lock for locking down your applications. Not only that this application also provides fake die feature. After turning on this fake feature, when someone will try to open the application you have locked then this application will give fake error message. So that user will not even able to know that you have actually locked down the application. The new version of this application is also having ‘hide pictures’ feature which was missing in the past. So now you hide your pictures from gallery directly from this application.

Gallery Vault application

This application provides the same features as I mentioned in ‘Hide pictures’ application. But the thing I like about this application is the user interface of this application. It is very user friendly and easy to use. This application also provides some unique features that were missing in other. Like other applications you can hide audios, videos, pictures, documents and other files using this application on your phone. You can also hide this application icon from the menu list so that nobody can open this application. This application also support user interface of latest android lollipop version. Other thing I like about this application is you can directly take photos and videos in vault which are locked automatically. You can directly share them too from the locked gallery available in this application. Other unique thing this application has provided is you can just shake your phone to close this locked gallery when you are in hurry so that you never forgot about closing the app.

So this is it. Just try out above method and applications and I am sure you will enjoy them. You can easily hide your stuff from others on your phone and maintain your privacy. These days privacy matters for different reason so better you keep aware of these things. So keep your mind sharp and do some action. Best of luck.

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24311
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24311Google is beneficial, fun and good for everyone. It has many services. Search is prominent one but it is not the only service from Google. It is a delightful experience that Google provides so much for free! Google provides users with a variety of tools to recreate own search engine. Google’s customized search engines not only give relevant repository of information overload of what you are searching for, but also adjudicate additional option of mass-monetization of highly personalized search results.

So much of resources Google prescribes to users is unimaginable to say the least. Creating sites with Google and hosting it with Google for absolutely free of cost. Adding Google Adsense on it for monetizing the contents of sites. You can recreate a blog with Google’s blogger then redefine your language skills and share ideas all over the world. Google provides enough tools for webmasters to implement on their sites and share relevant information with the world. Google is omnipresence in internet spheres.

Wide range of Google’s portfolio:

It is indeed very difficult to live a life without using multiple tools to Google a day. A majority of Google’s tool have just used by many without proper realization. Google expands its portfolio day by day and continues its innovation with the internet world to the extent no one would ever think of the very amount of innovation and reasoning behind creating a successful Google tool. Notions on webmaster tools are clearly interconnected with algorithms of search engines.

That is why for every webmasters take help of Google to incorporate modern SEO (search engine optimization techniques) for proper indexing sites with Google. Outdated and unpopular tools of Google never make headway inside internet world. It continues with its expanding ideas of ambitious innovation in recreating convenient tools for users. Most of its new offerings stay in stage of ‘beta’ for long enough times still all traces of doubts are cleared over new application.

Advent of Gmail from Google:

Decades back when Yahoo Mail was hugely popular, despite its continual faults and dalliance of long loading times and downtime of its servers. During that time of the internet was super slow. Yahoo Mail many a times took huge loading times and that generates huge disappointment among disgruntling users. Google initiates Gmail (Google Mail) on strictly invite basis. It was a newer concept and creates a sense of amusement and ecstasy among internet users. Experience of Gmail was huge for them and the ease of functionality within email architecture was additional boon for them.

King of internet:

Surprisingly, it stayed on the stage of ‘beta’ for long enough to respect Google opinions of users and continue implementation of their suggestions on further improvements of Gmail. Philosophy of Google works in this way as it continues unabated to provide utmost satisfaction for experiences of end- users and try to make every possible offer for free of cost. During times of old Yahoo Mail, when users had to delete older mails in order to keep space for arrival of newer emails. Gmail provides a complete reversal of what existed for Yahoo Mails. Google established a huge number of databases all over the world to give maximum space to users.

Many users of regular Gmail users have found that down time for Gmail is almost negligible seconds of times. Google established a huge number of content delivery networks (CDN) all over the world. CDN loads webpage say Gmail with vast amount speed and continue to contact the nearest server of client’s computer. Google is currently the king of the internet and continues to provide the vast majority of tools that could attract more and more users to use Google-enabled services.

Google aims at creating relevant digital passions within long stretch of internet users through customized offerings of goodies for a variety of reasons. Google desperately wants users to use their default applications for reading email, reading newspaper, watching movies and so on. Google watches intently user’s activities and provides customized offerings to users. Google’s answer to the mobile platform is android. It is platform independent which provides additional space for OEMs (original equipment manufacturers) to prescribe customized solutions to users.

YouTube and Google Play Store:

YouTube is the most popular video sharing and watching the platform of the world. In its initial years, users were not permitted to download these videos on their device for offline viewing. Users download YouTube video downloads application from different application environment other than Google Play Store. Google Play Store is a repository of application created and maintained by Google to be used by the vast majority of users all over the world. Google Play Store is guarded by Google for malwares and other malicious applications.

Most of a customized version of Android prepared by original equipment manufacturers (OEM) also installed their own version of a repository of application environment and slowly allow such applications which are mostly banned in Google from its Google Play store for violating terms of rights of Google. Users download YouTube downloaded from Samsung Apps and installed it on an android. These applications utilize Android’s native sharing application to download videos of YouTube to be watched offline on their device.

New offline features of YouTube:

Google observed this behavior of user’s worldwide. People desperately want YouTube videos to be watched offline for watching videos while not connecting to internet. In its latest application updates of YouTube, Google closed such tricks being performed by separate applications and stops such applications to download videos from YouTube through illegitimate terms. Google introduces new offline features on YouTube videos which are almost same as that of downloading videos but there is a slight difference in it. Google uses specific Gmail account to use its variety of services and now specific users could download specific YouTube videos and watch it while they are offline.

Through the notification would show that these videos are available for two days, but in actually it stays forever. What Google had done by introducing offline features of YouTube is that it had slowly removed the eccentricity of third party YouTube downloads. It introduces a cleaner policy of allowing videos to be watched offline on android devices only and those videos could not be transferred to another device but for sure there would be only be exclusively available to specific android device.

Google code for developers:

Google employs white hat popularity of its applications which are mostly accepted by the majority of users. Then, Google releases entire codes for developers for further development and suggestions from people all over the world. Google Code is for the developer only as it provides a wide variety of source codes for them. It is mostly a learning website for developers as they would find a wide variety of API (Application Process Interfaces) that would help developers to create and cross-connect their application with various Google-enabled services.

Google loves being open-source. In the past, it supported development of the Firefox browser, though after its own open-source Google Chrome project started it had slowly moved out from super active support of Firefox from Mozilla. Similarly, it had a great partnership with Sun Microsystems in creating a better open office program. Open office program is a substitute word processor to Microsoft Office. It had gone to the extent of interchanging the programmer in order to pacify programming of openoffice. Favorite arena of developers is Google Code. It has loose varieties of APIs including APIs from Google’s blogger platform.

At some point of time, Google found that general computer users find it always hard to integrate APIs with their personal internet platform. For this, Google created Google Tag Manager, which is the safest place for developers to automatically install APIs without need for an advanced coding expertise. With Google Tag Manager, users would easily install heavy Google Analytics code on their site without actually installing Google Analytics code on the header of sight. Most times, codes of Google Analytics are heavier and tend to slow down the site. Webmasters used to install on their site as it needed to properly analyze their site and this it is of extreme importance to use APIs while installing such heavier script.

Google Analytics and Google Tag Manager:

Google Analytics is a free analytic tool for individual and small and medium sized webmasters to collect and gather various data information and the way different visitors reach to website from around the world. The script of Google Analytics is heavy and does considerably website. Google’s ‘Google Page Speed’ is the perfect measurement to measure speed of any site. On the other side ‘Google Analytics’ is slowly killing many websites.

Google crawls faster WebPages which load quickly:

Google loves the web and wishes to make it user friendly and fast. It wishes more information for users and wishes to load every website at supersonic speed. It knows there are many places of third world countries where the speed of the internet even in modern times is slower than speed of summer winds. In developing countries, people love the speed of the second generation internet as it is cost friendly and does provide good speed for users to complete almost all tasks which they wished. Webmasters have to purchase a domain and hosting. In order to make website faster they go to have to purchase some content delivery network (CDN). Most of times purchasing CDN impose additional expenditure burden on webmasters for their website. In the term of internet, zipping of website is called as ‘Gzip’.

Website with Gzip enabled function, loads faster. Google wants webmaster to speed-up their site with the addition of better content delivery network on their site. Cloud Flare is a free content delivery network and most of hosting providers have their agreement with it but still it is free which means it would cut down many performances of your site when it receives vast traffic. There have been some complaints from various webmasters about a drastic drop of visitors to their site when they are using the free version of CloudFlare. CloudFlare is a content delivery network as well as protect your sites from unwarranted loggers and attackers.

Google’s own content delivery network known as Google’s Page Speed:

Google introduced its own content delivery network known as ‘PageSpeed’. It is super fast and completely free. It enhances the speed of website to quadruple level in no time. Difference between ‘PageSpeed’ and other commercial CDN is the former uses ‘mod-deflate’ function of the current host and others configure different hosts to exist Host. In order to perfectly use ‘PageSpeed’ at Google one need to have strong hosting plans where allocation of more central processing units (CPU) for site.

If you have a good hosting plan and additional resources to surmount extra CPU Usage. Then it is better to power your site with Google’s Page Speed. It is absolutely free and site loads quickly at every possible servers for Google crawls your site throughout the world over to load your site from shortest possible server distance.

It means to say that Google covers each and every bit of aspect of internet spheres even from the spheres of speeding up website by offering its free tool of content delivery network. Some webmasters complain that after implementing ‘PageSpeed’ CDN most of third party advertising scripts are not showing.

I have personally tested this and have found that some advertising scripts are not showing. Most of webmasters earn from all these third party advertising scripts and if these scripts would be barred after implementing ‘PageSpeed’ from Google, then they would think twice before implementing script on web site.

The boss Google:

Google also has shown some sort of high-handedness while giving some of the most popular tools for free. This is the perfect example of how the fastest content delivery network of world from Google which is ‘PageSpeed’ not able to generate much appreciation from most webmasters who rely on third party advertising options except Adsense from Google. Most of upcoming and new webmasters mostly go for alternatives to ad sense and for, this they are still apprehensive about implementing content delivery network from Google.

This means that if you have to advance approved account, then it is wise for you to implement ‘PageSpeed’ from Google. It will load these scripts in no time and reduce the ultimate page loading time of website. If you have no absence approved account, then it is better to go for alternatives CDN so that yours existing advertising revenues coming from different sources would not be interrupted at any point of time.

Recent updates from YouTube for android devices completely shut down every possibility of downloading favorite videos through third-party YouTube video downloads. Now, YouTube provides you opportunity to see offline videos by downloading but all these could not be downloaded to external hard drives. This means offline videos would be only to be seen on your android device. It is a convenient but still there is a cap to use it as some of the most popular Google services have been doing this on a continual basis.

'Google user content’ of Google Chrome on android device:

Only few days back Google silently launched ‘Google user content’ a hidden tool on android device. Hopefully, its desktop version would be soon to be launched in desktop chrome browser. Currently, it worked with android devices, and I have not tested it on Apple phones. When user searches for any term with chrome browser of android, it shows search results on favorite Google search engines.

When, user clicks on a particular link, it opens a short hand version of website instead of usually from origin server. Google employs super secure connection with the name of ‘Google user content’ which loads website at a different resolution in accordance with speed of internet connection of users.

In the era of internet, webmasters have to use various forms of web optimization techniques to optimize their sites. ‘Google Webmaster Tools’ which helps webmasters to optimize their site for internet users as well as for search engines indexing. It covers a wide variety of tools to optimize the site on every possible terms.

Some renowned retired tools of Google:

I missed ‘Google Web Accelerator’. During the era of Windows XP, where most of speed of the internet were slow and sluggish most times, users do have to pay for what they intended to browse for. In these circumstances, most users intended to use ‘Google Web Accelerator’ from Google. It is like a content delivery network for your computer.

At that time, Google says it is best for broad band users but still dial up users could feel the difference of page loading times of Web Pages. Google Web accelerator is not actively supported by Google any more. Its support ended in the year 2008. Download links of it are still available for other third party download sites.

Google’s scholar:

A decade’s back, when there is lesser penetration of computer in day to day life and most of times, during research on any paper one has to completely goes back into the deeper shelves of library and used to search for large set of books to find relevant information for research works. Now, with the advent of Google Scholar, one would easily find tons of references of recognized scholars with deep integrations of banks of resources attaches with it provide adequate framework as well as long-range denominations of additional bit of inferences which could easily demonstrate the most pertinent and attentive conclusions on any research parameters.

The interface of Google Scholar is typical of all Google products where one could find each and every bit of information with similar search overhead of Google. Here, search results are explained in details where one would find the exact point of reference and understanding before logging into that websites. Google Scholar has stringent set up rules where one would find extremely difficult to add non-recognizable form of information into depository of Google Scholar.

Google recognizes some pertinent research houses and accepts research articles from these houses only. In this way, the quantum of information deposited inside Google Scholar might not have been on the same side of Wikipedia or other free sources of information but there are some serious works which are included inside Google Scholar. The main reason for creating Google Scholar is to provide sufficient and relevant depository of information to users who are searching for some serious relevant information.

Negative sides of Google Scholar:

Do not expect all articles inside Google Scholar to be available free of cost. There are many research houses which demand prices for reading articles. Though, fee of such articles are nominal and most times similar to nominal fees and most times would not hurt pockets of users. Most times, all paid articles have nice and lengthy abstracts and by reading similar abstracts research scholar would get nice little information which could provide deeper advantages of any relevant topics they would have been taking their research off. For college students and research scholars, Google’s scholar is like a dream comes true for them.

For general search enthusiasts it might not seem to them as relevant as they would search information on general Google searches. There are many negative sides of Google Scholar where one would find that most of these search results are paid ones and one would find extremely difficult to handle as one relevant search and link you find seems to suggest, to pay links. Continuous search points to generalise results and one would take huge patients and practice in order to find relevant searches free of cost.

Google Panda Updates:

Google’s search engine is a distributed network of hundreds and thousands of networked computers with vast memory sizes. Google releases various levels of ‘Google Panda Updates’ in order provide additional levels of strengths in search engines.

Internet means Google and Google mean its web search. Many internet users failed to memorize a long list of favorite websites but they have a tendency to search for relevant products and find out a different set of similar information which guarantees better search results. Few years back, it has been seen and found that many search results of pertinent information in the front page of Google lead to some worst search results. Such websites seem to be the black-hat enabled website, which is empowered by some against the rules of Google, that ultimately have good Google’s page rank but bad reputation with worst contents.

Slowly, numerous internet users left to alternative search engines where they have found adequate amount of information from search results. Then, Google releases its series of search engines updates known as ‘Google Panda Updates’. It is internal search engines update of Google which depends mostly on its own internal configuration of search engines where it uses some basic tool metrics in order to categorize each and every level of website in order to present relevant information to users.

What is Google Panda?

‘Google Panda’ is a secret search engine algorithm from Google which aims to rank search results in accordance with user’s perceived knowledge-base. It deals with high-quality articles which generate large interests among internet users. Google wants website owners should directly deal with organic traffics.

My dilemma with older articles:

In recent months, I have been especially focused on different aspects of enhancing quality contents of sites through rewriting older articles. Website started from August 2007 and in those times my first article was all about different provisions of how to secure your personal computer while browsing the internet. It is all about Windows XP and Windows Vista which had been in prominence in those times. After, eight years, the heart of that article was seriously lost due to end of Windows XP life cycle support system and introduction of Windows 8.

When that article shows in Google search result, users would find it completely out of date and unwanted. Seriously, Google also slowly pushes that article into a back burner surely of reason that is sufficient enough as it does not want to provide a link to that article where users are searching for security of personal computers against ongoing security hacks. It is completely unwanted and unjustified and not necessary at all and it does not guarantee, enough pertinent results.

That is why; I decided to update those articles. As a webmaster I want every article, I wrote should be up to date with time and people should not feel left out while reaching to that link from Google or any other search engine. The first question that comes to my mind is that would visitors trust the written information presented in that article. After going through an eight year old article, I am confident that it is outdated and it needs to be rewritten considering what needs to be done to strengthen the security environment of Windows 8 and beyond. Then, one question pops up in my mind is that whether I should completely rewrite that article or should partially change that. For this, I have to go through that entire article and need to understand the theme and the pertinent advantages presented in that article.

Most of security applications and software recommended in that seven year old articles suggest that those tools and software are either out of date or not was updated for a while. Most of these suggested tools are now part of Windows 8 and users does not have to downloading and instal those tools. So, it presents an interesting idea to compare both eras and add some renew security mechanisms that would completely make the entire environment of the operating system justified and convenient. In order to create an environment of high-quality content, I need to focus on different subjects but this time the theme of the Windows operating system should be Windows 8 and beyond.

Websites owners refocused on rewriting older contents:

Google’s “Panda” algorithm concentrated deeply on high-quality and unique contents, large number of websites to be focused on rewriting older contents. I searched Google for plug-in that would automatically create internal linking of keywords of website, and found there are several of it but I am not satisfied with any of them. One plug-in does the internal linking of website automatically and invisibly but the saddest part is that it takes huge hosting resources and imparts heavily on loading time of websites. It does make a difference and slows down website considerably which is not good for indexing of websites in Google search results.

Just like I have said above, internal linking of website is good for search engine optimization but it has to be done manually in order to recreate internal track-back of pages that would connect one page with the other. Google has every right to make such stricter algorithm for providing better search experience convenience of users. Search runs with very complicated mechanisms and it is an ever growing algorithm and its functions relates with an entity of evolving art and science that the main functionality of brain runs with. Similarly, while performing internal linking with that popular plug-in, the author found that, after initialing of that plug-in entire internal linked pages vanished completely.

So, what is needed for such automatic internal linking of web pages while these actions could be completed manually?

Manual internal linking of Web Pages takes a hell lot of time, but it would have you for permanent solutions. Strongest possible high points that count for a high-quality site is that it should be well-equipped and perfectly internally linked with its important keywords. Webmasters should build a site considering stepping into that zone of what goes into minds of Google and what future perspective Google would be there? Quality of the article should not be shallow in nature. Article should be at least of 1000 words and should also follow them of topic in entirety.

Search for similar-natured article on your sites and does all these articles present similar intention and ideas which are never ever to be meant to be understood at any point of time. Detect those articles and rewrote those with newer ideas and then show those lists of updated articles in the side bar so that search engines would like to crawl those articles present those to users in sufficiently newer forms. Check those articles with online plagiarism checker and completely proof reads those articles. Google does not like misspelled and plagiarism contents. Always write original content and suggest personalized view of each content.

Write genuine contents and present real facts in article:

There are a few very well-written articles but, sometimes factual information written in those articles is incorrect and false. Try to check those information and present true information and review of every information which you would wish to present inside of that article. There must be comparable articles on same subjects written by different webmasters all across the world.

After writing your article, the next step is to make a google search on that subject and read those information from there and find whether information provided on these article on the same of every subject presents similar ideas of what you have written in your article. If the answer is yes then the next step is to add newer ideas that yours opponents presents in their articles.

Next step of your article is to find out how much percentages of control does your article present with the theme of the article. It should be nearer to 90 percentages in order to find out the exact bit of information and correctness while covering entire aspects of legibility of the subject inside of the article.

If yours article deals with some controversial subject whether there is equal pros and cons on subject, does your article presents equal space for both ideas existing in this and does all these presents vast scale of quality contents and does not provide anything substantial support for any base. In simpler terms does your site recognizes the theme authority of subject, and if the answer is yes then you are on the right path. If all these seemed to be providing some prudent ideas on these subjects, then your article is on the right path.

Content is king:

Share contents to social networking sites as well as put Google Webmaster’s stamp authority on it. After saying that article, author should proof read three times. Does that article read well or it has been harshly put forward which does not justify creation of such fine work. Most times, non-English natives have problems writing well-defined article which needs to be checked again and again for its correct semantics. When user reached to your sites, and read your article, it means it trusts your contents and if it finds out some well-written contents then there is every possibility of further implementation of these ideas into their real-life.

That is the reason why one should always be prepared for such articles which would mean heavily for users in determining directions of life. Google sees such sites and create augmented ranks of such sites in order to present a really good picture of such sites and that creates additional momentum and generation of revenues. This implies the amount of comprehensiveness and completeness of the topic on your site.

Every article should provide insightful analysis, off topic with complete authoritativeness that leads to various decisive ideas depicted inside article. While, writing for website one eye of author should be on interests of users and the other eye should be on what Google wants from yours site and what are essential ingredients that require further strengthening of website in terms of search engine optimization (SEOs) techniques as well as proper distribution of contents of sites all across internet. The power of website increases with the advent of organic visitors. Organic visitors are humans who reach to website. They are not searching for spiders or spun contents of gaining large chunk of visitors reaching out to your site from across the world.

Then, it is still been a debated issue of whether to take support of Google in enhancing brand of website or go solo and does not care for Google search rankings. It is difficult to predict but when your sites get an adequate amount of exposure and dedicated organic readers then you should be courageous enough to reach out such proposition of ignoring Google while developing branding part of your site. Even Google suggests one does not need to focus on a single line of search engine optimization techniques but focuses more on improving quality of sites in detail in order to provide ample amount of generation of ideas and logic while recreating theme of the subject. It is always wiser to revisit in great length at discrete points of articles in order to provide quality contents to visitors. In this way, your site would like to emerge as a great site in the future with long standing dedicated quality of articles as a perfect support base of it.

What Google wants from webmasters?

In short and simple, Google wants high-quality contents with the entire focus on the theme of the subject. Google search algorithm is not human powered calculative device; it deals with a large chunk of automated configurations in finding out real quality of contents inside the vast majority of sites. Many webmasters also equally good in finding out flaws in such techniques and that is why most of them able to secure well calculated rankings.

That is why indexing part of search engines does change from time to time in order to catch hold of such tricksters and punish those sites with lesser ranking systems. Google highly rewards such sites with quality contents and better visibility of the site all across the internet. The principal aim of Google’s “Panda” updates is to reward better sites with better ranking and proper visibility in search engine rankings.

Google favors white-hat search engine optimization (SEO) techniques and sharing of contents all across shared media networks. From amongst all such social media network, the prominences are Facebook, Twitter, LinkedIn, stumble upon and others. Those webmasters, who are most probably implementing textbook search engine optimization techniques, always put forward constructive and positive values to website.

Better search engine mechanisms, create huge factor for crawling of individual pages. Most of SEO (search engine optimization) are techniques, aim to inherit keyword parameters of website and intimate search engines with the proper form for crawling of individual pages which are meant to release information related to a particular subject.

White hat optimizer:

A good SEO technique is called as “white-hat” optimizer. It is best for the development of the site and provides adequate readability for content of website. SEO of website is related to good marketing part of website. Marketing of goods is extremely related to SEO for website. It is all about introducing various creative ways to create populist ideas. The final result of a great site is to create proper awareness and agility among reader all across world. In this way, all such good words and properly distributed visibility would create adequate attendances of people in creating proper visibility of contents all across the internet world.

SEO creates proper awareness and proper engagement of people and provide adequate information highway in order to engage people. There is still a bad side of everything and that does exist with search engine optimization techniques. The opposite of “white-hat SEO” is “black hat SEO”. Google calls “black hat SEO” as “black hat webspam”. There are some notorious web-spam methods which deal with keyword stuffing and link scams only to generate huge indexing of the contents within the shortest span of times.

Black hat web-spam:

There have been numerous such articles which fear some irreversible happenings out of Google’s Panda updates. This is nothing to fear about for good webmasters, who have been following decent rules of writing high-quality contents, without any such need for performing so called black hat web-spam. Such clean webmasters need not have so much worry about such deep-linking of articles as with due course of times. They're good articles would be indexed by Google.

Google’s Panda updates aim for bringing out high-quality contents without compromising quality of sites. It aims to provide cleaner experience for internet users as well as prescribing them with smarter generalized ideas so that more and more people read high –quality contents while surfing internet. Google feels differently, as it rewards high quality sites without compromising quality and with, these updates good quality sites get proper face lift and higher amount of traffic than ever before.

Google assures good webmasters nothing to worry about Panda’s update. It is a content quality filter, aims to upgrade good quality contents with higher and smarter levels of materials so that it stays at the top of internet search engines as never before. It wants unique and detailed content delivery so that requisite people get a higher amount of information irrespective of the same category of thoughts and ideas.

When search for ‘how to amplify FM signal’, the prescribed search series would be full of information but most of them are hardly about exact innovation techniques involved with expanding the scope of FM (Frequency Modulation). Google pushes its Panda’s updates so that every time good qualitative information on a specific search term or category comes out in open and provide users with relevant links. In earlier times, popularity of search is deeply related with link popularity which has been generated due to the advent of different black hat distribution techniques.

Why Boddunan was able to survive Google’s Panda update:

As a result of this some of popular content marketing sites such as Bukisa, Triond, Expertscolumn had to suffer because they allow a large set of articles without proper scrutiny. Bukisa suffered the most as it allows writings from contents marketers without proper checks and balances. Triond suffered as its users face deep setback of earnings but still it manages to hold back due to direct Adsense relationships with Google. As a result of these developments, individual writers with their own set of Adsense approved account able to use it in their Triond account to generate handsome money.

From the very beginning Triond implemented stricter methods against spammers, spun contents and plagiarisms. There are many instances of completely suspending some of user’s account from Triond. Webmasters able to provide quality contents on their sites and generates some amount of monthly revenues. From among all these content marketing sites, boddunan.com ranks higher due to its brilliant check and balances in publishing user’s contents. It works with its own Adsense and price of the articles are evaluated from the beginning.

That is why “Boddunan” was able to withstand such strong force of Google’s Panda updates without any such miserable consequences. Similarly, there are some websites which rely on sending users to amazon.com by writing about specific set up products with concerned affiliated links. All these websites are heavily penalized by Google and as a consequence of it, generation of revenues of such websites reach to abysmal lowest tide within shortest possible of time. The heavy demise of income from contents marketing site such as Triond is due to badly written contents which are unwanted in front search results from Google.

Most of these links are hugely popular because of inbuilt social networking performance of Triond. If someone has such account they would find internal messaging to see their sites in exchange of other sites. All these are resulting with the creation of an artificial set up observations where most times there is clearly absent of organic visitors. All these lead to change of internal indexing configurations of Google to create noble management of sites to perform real sites in appearing search results.

Conclusion:

Whether or not useful information is there or not but still one would find these links at the first page of specific search results. These are just some of the myths which result for Google to change its internal invisible system which search for specific web-pages before appearing on its search results. Google generally gets its highest amount of revenue generation from “Google Adwords”.

That is why concerned Google, decides to remove so called spam pages from its top search results. Astonishingly, there are many hugely popular websites that have been removed from these front search results. Ultimate aim is to reproduce the unique and quality contents for your website and generate wider and multiple levels of articles while performing hugely same set of ideas from the same subject.

Google does not like this content sites which aim at providing little information but use different social media networks to gain immense popularity within Google’s search rankings. It is not likely to duplicate contents. There are some content writing sites in the past which allows duplicate contents in their repository and distributes money to users. Google does not want these sites to be indexed on its search results as a consequence of it, more and more such so called contents writing sites face untold loss of revenues and slowly fading up scenes permanently. Google does not like to spin contents. Spun contents are machine generated articles and these articles would be placed in millions within some minutes.

Google wants webmasters to write down from their thought processes instead of spun contents. Google is also looking towards the problems of individual based webmasters who are deeply hurt by regular Google’s Panda updates. Google has equated industrial website with individual based WordPress sites and for this many small webmasters have faced the brunt of this. Google assured such webmasters to release a series of soft Panda updates so that there would be some change of configurations for individual webmasters who does not have so called higher value of money and people to generate higher quality contents.

]]>mohanmekap@gmail.com (mohan manohar)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24295
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24295Recently I have purchased a Apple Macbook Pro Retina 13 inch laptop. I’ve always wanted an Apple Macbook because it looks so good and the display is very crisp and clear. And I’ve been said a Mac has much good performance (But I suppose any Windows laptop which comes with the same price tag will have much better or at least the same performance). It’s been a few months since I’ve been using my Macbook and so I decided to write an article on the things I liked about it and the things I liked in Windows but cannot do in a Macbook.

Without a doubt Apple knows how to make a crisp display. I could feel the difference when I am browsing through various webpages. Even the fonts look much smoother on Macbook compared to other notebooks. And honestly, that makes you browse and read more online.

Trackpad Gestures

On Macbook you can do a lot with your trackpad. On Windows trackpad can only be used to move the mouse pointer and click. On a Mac, in addition to these, you can scroll by just sliding you finger up or down on the trackpad. Want to get a preview of all currently open windows? put your four fingers on the trackpad and slide up. To go to desktop you should spread out your four fingers including the thumb on the trackpad.

This feature is very handy and makes it easy to do your work even when you don’t have portable mouse.

Multiple Desktops

On a Mac OS you can have multiple desktops. What’s the use for it? Well when your one desktop is full of opened windows and files and you want a clean one to do some other job, you can just switch the desktop. If your kids or spouse were doing something and you want to get a new desktop to start your work this feature might be extremely useful for you. You can even set different wallpapers for different desktops. So maybe you can set one wallpaper for your home use and other for your work use. From the desktop slide the trackpad left or right with your four fingers to switch between desktops.

Dashboard & Notification panel

You can access your dashboard just like accessing another desktop as mentioned above. One of those desktops is by default you dashboard. There are thousands of widgets you can embed on your dashboard like Stocks, Weather forecasting, notes etc.

You can access the notification panel by clicking at the button in the top right corner of the screen. Notification shows you updates, emails etc. You can choose what to show up on this panel. It’s extremely useful.

Now Coming to things I liked the Windows way

Shortcuts

Yeah the shortcuts are different for both Windows and Mac and I was aware of it. And it’s not a big deal to adapt to some new shortcuts. But the one things that I really don’t like is that the enter button, used to open files in Windows, does renaming in Mac. To open file the shortcut is Cmd+O. I mean opening a file is the most basic thing and it should be simple. I would have been fine if it were Space or Shift button but a key stroke combination? That’s not so wise.

Taskbar

The main task bar in Windows is a bliss when it comes to multitasking. You can always see how many windows and what all applications are open. The folders you’ve open is also shown there, a feature Mac OS don’t have till date. I really miss this bar the most after switching to Mac. Of course, with fancy gestures one can do almost everything a Windows task bar can do, but it is not as comfortable as in Windows.

Switching Windows

I really love switching windows on Windows withe Wnds+Tab key combination. Such a switching features is not available in Mac. Though, as I’ve mentioned before, one can use gestures on trackpad to see all open windows. I got to admit, with the task bar and this feature navigating between Windows is much easier compared to the Mac OS.

File Explorer

Nothing beats the Windows file explorer. I Like the way Windows’ My Computer and from there Hard Drive partitions and further. Mac OS have something similar to My Computer, it’s called ‘Finder’. From Finder you can access all the files in your Mac.

TONS OF SOFTWARE

A clear advantage Windows have over Mac! Not even hardcore Apple fans could deny this fact. In Windows it was much easier to open and edit files of any type. But with Mac, it isn’t. One of my favourite Windows softwares were Internet Download Manager (IDM). There is not a Mac version for IDM and I’ve been looking for an alternative ever since I’ve moved to Mac. But I haven’t found anything that offers even half the functionalities the IDM offers. IDM’s browser inbuilt Video downloader is the feature I use the most. Now I rely on Google Chrome and Mozilla Firefox plugins to get the job done.

Another software I like is NitroPdf, a complete Pdf Suite. Unfortunately, doesn’t have a Mac version. Well the list could go on forever. Simply put, there are far more useful software available on Windows platform then in Mac platform.

These are some of the differences I’ve noticed. I got to admit, Mac’s trackpad is addictive. Now using Windows trackpad has become frustrating for me. But the frustrating thing with the Mac is that you don’t always (most of the time, to be honest) find a Mac version of a software you want to install. Also I’ve heard Mac is not a very good option for gamers (I don’t know why) but that wouldn’t bother me because I am not a fan of computer games. But I’d definitely recommend a Mac for designers because it displays much more details than any other OS I’ve seen before.

Mac also has a thinner and more affordable model, designed for business people, called Macbook Air. Check it out as well!

What’s the biggest flaw with an iPhone? You can’t send files over bluetooth. What’s the fix? Jailbreak your phone!

(Jailbreaking is kind of like hacking into the phone and making changes to the system files, which is not recommended by Apple, so that you'll have more control over your phone. You'll lose warranty after Jailbreaking. Apple wouldn't help you with anything if your phone is Jailbroken!)

This is how I ended up jailbreaking my iPhone 4s a year back. It was all good in the beginning. You can now send and receive files over bluetooth using an app called Airblue Sharing. You can change themes and there are hundreds of themes out there which are stunning (A custom theme on iPhone makes other iPhone users surprised and excited!). Also find tons of third party apps which was otherwise not installable on your phone. There was an app called Cleaner which would find and delete unwanted files on the phone and saves huge space. Have complete control over your Control centre, add your favourite shortcuts. Life was good.

Then problems started to occur. First one, I suppose, was with locking the screen. When I press the lock button the screen goes dark (like normal) and then it turns back on itself. So I’d have to press the lock button twice every time. Then my battery began to drain quickly (I am not sure whether it was due to Jailbreak or some hardware issue, I changed my battery just before I removed jailbreak, so can’t say it for sure). Also I had some issues with syncing my iPhone. It wouldn’t sync properly nor it would backup the files instead iTunes was only able to backup my settings. Custom themes weren’t as fluid as the default theme. So I removed all custom themes from my phone.

I was still okay with all these as I can send and receive files from my friends and I use bluetooth way too often for that. It was then apps like Xender and ShareIt hit the app store. These apps support file sharing over multiple platform at lightning speeds (like 3mb/s, approximately). My bluetooth app (which could never even get to like 500 kb/s) has nothing more to offer.

Chapter 3 - They won’t let me back in!

So I’ve made up my mind! Jailbreak has no more purpose for me. I’d go back. So I waited for iOS 8 to release. I’ve downloaded the OS and tried to update my phone. A bunch of errors came up. When I looked up the errors online (using error codes), it was due to faulty cable. Then I replaced the cable and tried again and still errors came up. Many websites said these issues happens sometimes and you should edit some system files or use applications like TinyUmbrella alongside to successfully update. And it was totally annoying. Apparently, iPhone has a mode (in which it is neither on or off) and to get to that mode you have to press your home button and lock button simultaneously for some seconds… And to update my iPhone with TinyUmbrella I have to put the phone to that mode, which is called DFU mode. What’s the big deal? my Home button is broken (I use Assistive touch, i.e. Home button on display screen which I can’t use when my phone is not really ON).

So I fixed my home button (which i determined not to fix!). I tried again, no use!

I gave up! I was now stuck with my iOS 7.0.2 which wasn’t able to install many awesome apps in the App Store.

Chapter 4 - A Last try!

After a few months, I purchased an Apple Macbook Pro 13 inch. So I thought to give it a try to update my phone to, iOS 8.1.x, then latest version. Similar errors struck me. Also, TinyUmbrella’s latest version seemed to have some issues with me. I was let down, one more time.

Life went on. I wanted to get my hands on an iPhone 5s or at least 5c (I don’t have the budget for iPhone 6, unless I sell my left lung, and I don’t think it has any feature, which isn’t available on iPhone 5s, that is that awesome. I thought about it, my iPhone can run the latest OS technically. For some reason I downloaded iOS 8.2, the latest version, tried to update my phone. I didn’t have the slightest hope that it would work. But it did!

“Hello!” was shown on my screen. For the first time, I said hello back to my phone screen. It was finally done! I have iOS 8.2!

Features of iOS 8.2

I love iOS 8. It has so much more features than iOS 7. Both looks almost the same. But there are at least 5 or 6 features I fell in love with. It would include Widgets in Notification centre, Shortcuts on Multi task screen, upgrades in universal search etc. I could not live with iOS 7 anymore. So what’s next? It’s time to jailbreak iOS 8.2. Just kidding!

Now that I have the latest iOS installed on my old iPhone 4s. I think I’ll hold on to my 4s for a little longer. After all, it does everything I wants it to do. I like the 3.5 inch screen as well, was never a fan of big screens.

After updating all my the previous problems, like double pressing the lock button, vanished.

Now I can install many apps which were only available for iOS 8 (or 7.1 versions of iOS 7) like Microsoft Word, Excel, Powerpoint, EyeEm etc. I should also check out Siri as I have hear it has much new features now.

By the way, my Home button broke again. My lock button is also starting to have problems. Though I blame Apple for making low quality buttons (as many of my friends had same problems), I am glad that they gave us an option to control them on screen. I suppose I can’t put my phone to DFU mode any time soon!

I’ll be writing an article about the awesome features of iOS 8 soon.

]]>aroshu123@gmail.com (Roshan Ahmed)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24290
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24290Just a month ago Google has launched the latest version Android 5.0 called lollipop. Right now not all android devices will get the update for this latest Android version. Only few latest phones and other phones that used to get directly updates from Google like Nexus, Android One, etc. got this update. Other users have to wait till their mobile companies give the updates for the same.

With this latest update Google have done lots of new changes in Android operating system in compare to their older versions. Especially you will get whole new cool look with awesome animated transition in every action you done in your phone, for example, opening page, closing page, pressing any button, opening notification, etc.. I am sure everyone will love the new look. I have Android One android phone which recently got the latest update android 5.1. So I would love to share all those new features and new experience I had with this Lollipop android. Let’s see the new changes.

New features and Changes in Lollipop Android

Lock Screen: Let’s learn about what changes have been made with lock screen with this latest android version.

First of all they have change whole system how we unlock our phone. In older version you have to swap the circle to right to unlock your phone. But now you can swap upside anywhere on the screen to unlock your screen. By swiping right anywhere on screen you will open dial pad and similarly by swiping left on screen you will get camera.

Not only that with these latest android version you will get all your notifications like messages, whatsapp, missed call alert, etc. directly on your lock screen. You can access all those notifications directly from your lock screen. To directly open that notification you can double click on it. To just ignore you can clear them by swiping it right or left. To expand the notification to reply it back you can swipe it down.

So with latest version, lock screen got lots of new and important functions those were missing in the older versions.

Notification Panel and Quick Settings: Let’s learn about changes made in notification section.

Whenever any notification comes you will get one new tab on the upside of the screen unlike older version. In older versions we used to get notifications on status bar. To open the notification panel it is the same process as last one. Just pull down from status bar and it will open for you. But you will surely see changes in it. Now you will found whole notification transparent. I mean it will only open till notifications are available.

Now for quick settings, in last versions you have to click the right top corner icon, but here after opening notification panel by swiping down, you can again swipe down to open quick settings. Here you will see complete new look. Not only that this time quick setting feature is smarter than all previous ones. You can open window for extra features for each icon (app) available on quick settings directly into quick setting panel. No need to go deep inside settings and all that. For example, you can on Bluetooth by pressing Bluetooth icon from quick settings but in extra, you can also see available Bluetooth devices by pressing Bluetooth text available below icon. Means you will found extra features related to that icon when you will press its text. Unlike previous version you can add extra apps and icons in quick settings and mange them by long pressing any of them.

With quick settings icons you will now see extra feature of torch. You can use flash light of your phone as torch directly from quick settings. No need to install any extra app for the same.

Recent Apps Window: Recent applications window also get some important changes.

In latest version of Android you will found recent application list with larger icons in compare to older version of android. It also gives little bit 3D effect. With larger icons you can recognize any application with more ease. So it is now easier to find out applications from the list.

In the older version of Android, to close any application from the list you need to swipe them right or left from the list. Here you get the same option to close them down with extra button for the same thing. You will found close button at right top corner of every window in the list. So you can also click them to close the windows.

There is another important feature now available with the latest android version. Now you can pin the windows from the list so that only pinned window can be access until you unpinned it. Means suppose your friend or kids asking your phone for particular app or game. So you can give your phone by pinning that particular app so that they can’t access other stuff and applications on your phone. Until you unpinned that app you can’t access any other thing even can’t access status bar. You can access notification and you can’t see anything on status bar in this mode. So it is important feature now available for our security.

For accessing pinning feature you need to on this feature from ‘settings’ and then ‘security’. In security you will found ‘Screen Pinning’ option, just on it and then you will able to see pin option directly on recent apps window.

Launcher: You will also get the latest Google Now Launcher with this latest android version. Now you will get faster and smooth launcher in compare to past. Also look wise it is quite impressive. You can see cool animation stuff when you press app drawer button. It will open menu icons like in white cards so that you can recognize icons more clearly. Transition pages in app drawer are quite simple but it is fast and smooth.

Material Design: The main change which gives whole new look to this latest android version is material design. They have given cool transition effects in every section and with cool animation stuff at every work, even at pressing any button. Now with this latest version of Android you will see change in the color of status bar with every new application. It will change the color of status bar with respect of color of the application. So now look wise this android version gives really cool impression. At least I am enjoying this new look for now.

Settings Window: You will also see changes in Settings page. Now no more black window, here with this Android version you will see white background in the settings page. It is different thing that with lots of features now you will not have to open the settings page again and again.

Smarter Dialer: Dial screen also get little change in compare of Kitkat version of Android. Now you have more professional look in compare to any older version of Android. It also contains white background with smart dial feature. You can dial your favorite numbers much faster in compare to previous dialer application. You can swipe right or left on the screen to move to next windows of Speed dial, Recents and Contacts.

This is it. I guess here I have explained all major changes have been made in Lollipop Android version. As per experts, this is the most advanced android version with so many important changes made every. As I said right now not all users will going to get it but soon big companies will gives update for the same.

Image Source: By me

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24278
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24278Typing in any touch screen phones is little difficult part as you can make more mistakes in compare to normal keypad. In android phones by default keyboard application is not that good. I mean it not provide any extra features and functions than just normal typing. You need something extra and intelligent stuff for typing fast which is missing in the normal default keyboard application. But no worries, you can always download third party application from Google play store. So you can also have free and more intelligent keyboard application for your android phone. Let’s see which better options for keyboard application available on the market which can make our typing experience good.

Keyboard applications for your Android:

Go Keyboard: This keyboard is best to personalize itself. If you are bored with normal looking keyboard then you can go for it. Here with this keyboard you will get different options for personalizing it with different themes, emoticons, key tone, etc. There are thousands of themes online available for this keyboard so that you can get different looking keyboards. So that’s why main attraction of this application is to personalize it with different themes. You can download this application for free on Google play store. Just search its name and get it for free.

Swiftkey Keyboard: This is award winning keyboard application among several applications. In past this application was paid but now because of its popularity you can download it for free from the play store. Yes now there is free version of this application which is ad free too available on the play store.

This keyboard application provides you some smart feature that is not available on your stock keyboard on your android device. It will provide you smarter autocorrect option in compare to stock keyboard. It also provides more emoticons in compare to stock keyboard with emoji prediction function which is unique itself.

The main function of this keyboard application is that it provides fast typing experience with its swipe function. Because of this function it became more popular. You just need to swipe on the keyboard among those keys and its smarter function will auto predict your word and type it for you. So it can make your typing experience faster. With all these unique features this application also provides themes option which provides you beautiful themes to change look of your keyboard over stock keyboard.

Google Keyboard: This is from famous giant company Google itself. In latest android phones it comes preinstalled. But for better experience you have to update the application. If you are missing this application on your phone then you can install it from Google play store.

The key fey features of this application are the latest version of this application provides material design themes which are available in latest android lollipop version. It also provides smarter personalized suggestion with auto correction mode. It gives popup animations when you press the keys on keyboard which looks cool. It also provide gesture typing mode with dynamic floating preview using which you can type really fast and accurate.

So this is it. Here are few good options and alternatives for exchanging stock keyboard which can help you in fast typing. You can have additional features with these applications for typing and make your typing more interesting and entertaining. Now just after installation they will not directly available as keyboard on your phone. You have to choose them from the settings and make one of it as your default keyboard for further use. Let’s learn how we can make such third party keyboard as default keyboard.

How to use third party keyboard application on Android?

For using any third party keyboard application on your android phone, first you have to make it as default keyboard. You have to make it as default and change from stock keyboard to the new one.

For that first go to setting page on your android phone. Then find the option ‘Language & input’ and open it. In that window you will found ‘Default’ option under ‘Keyboards and Input Methods’ section. Now just click on that ‘Default’ option and you will able to see the list of available keyboards on your android phone. In that list you will also found the keyboards you have downloaded. Just select the one you want to keep it as default. That’s it. Now whenever you go for message or something the new keyboard will appear instead of old stock keyboard.

This process may sound complicated but it is quite easy when you will done it. So go for it. Just follow the simple steps and it is done.

So this is it. By this way you can change the default keyboard. By this way you can use your downloaded keyboard on your android phone. Default keyboard have not more functions. But this third party applications provide really well features and functions like emoticons, better auto correction, smart recognize function, voice typing feature, theme option and many more. So if you are also bored with your stock keyboard then you can also go for such innovative keyboard applications. Try it and enjoy.

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24002
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=24002Rooting any android phone means to access its system folder so that you can make changes in system files. It is a complex thing and one should only try this rooting stuff if he or she has enough information and knowledge about it otherwise you can brick your mobile phone anytime. Many people root their phone for different purpose. Some of them want to install custom android ROMs on their phone for getting more features than normal android version and some people root their phone so that they can use some applications which are very useful and have amazing features but they can only work on rooted phones. In this article we will see about some great applications which requires rooted android phone and they have some amazing features which we can’t get from any normal applications. So if you are interested in rooting and developing stuff keep on reading for more details.

There is big list on play store of applications which requires rooted phone but I will tell you best of them (as per me) among them. I will start with my favorite application Titanium backup.

Titanium Backup:

As I said it is my favorite because it is having very unique features of backing up different things on your android phone with other features too. Let’s learn about features of this great application.

Backing up applications: You can easily backup your all applications which you installed on your android device using titanium backup. You will say what is new in this and why it requires rooted phone for something like this as there are many apps available on play store which can do similar thing without rooting requires. Well, unlike other applications titanium backup also backup applications data which can be restore with the applications when you restore them. Means suppose you are playing some game and you are on ‘x’ level on it. Now you are backing up it with titanium backup application. Now when you are restoring its data and app using the same app then you will get this game on your new phone with all its data, means you will on the same ‘x’ level where you left. So it is also backing up your application data and for that it requires rooted android phone.

Delete system applications: If you are using android phone then you must have noticed that there are some applications on it which can’t be uninstalled. For example, there are some apps given from mobile company and some other are default ones like messaging app, calling app, camera app, etc. Those applications are installed on system storage and that’s why they can’t be uninstalled in normal way like other applications. But sometimes those mobile companies give extra apps which are not required at all and they are just wasting your extra phone space. Now titanium backup offers you a feature using which you can uninstall such system applications from your phone. As this application gains the root access it can access the system folder and delete those system applications easily.

Convert apps into system app: As I said above titanium backup can delete your system applications easily. Same ways they can also convert your normal application into system application so that they can’t be uninstalled in a normal way. So you can save your important apps from getting deleted or uninstalled accidently by you or other. Of course you can delete them from titanium backup and you can also convert them back to normal from the system application.

Gravity Box (requires xposed installer):

Gravity Box is the application which requires Xposed Installer to work on your phone. Gravity Box is one of the modules available in the Xposed installer application among several modules. But Gravity box is quite popular and offers you several features, so that’s why I am mentioning it here. As this topic is about applications which require rooted phone, so yes this application also requires root access of your phone. Gravity box offers many cool features which are mostly available on Custom ROMs. You can customize many things on your custom android ROM, same way you will also get customization features on your stock ROM using gravity box. You will get features like below:

Status bar tweaks: You can have many tweaks for changing stuff on your status bar. Using gravity box you can change color of all status bar icons. You can also change the position of status bar clock with extra functions related to it. You can also change your battery icon from available list. You can get internet speed indicator on your status bar using the same.

Make your stuff transparent: Using Gravity box you can make things transparent on your Android phone. You can make status bar, navigation bar, notification bar, lock screen, etc. transparent on your phone. Yes it will give you feel like upgraded phone for sure.

Other stuff: There are many more extra features available on gravity box and it is surely hard to explain them all. Still here are some of them.

You can get clear all button on recent app window with available free RAM bar.

You can change the number of rows and columns in menu on any launcher.

You can get CRT screen off and on effect using it.

You can change lock screen wallpaper separately, this feature is not available in many android phones by default.

You can add extra apps and features on quick settings panel using gravity box.

You can hide your soft navigation button from your android screen and also use PIE controls to navigate your android phone. By hiding soft navigation button you can get full screen too.

So this is it about Gravity box. I may have forgotten many things to describe as there are many things available on it. Let’s move towards another useful application.

Viper4Android: (Enhance Sound Quality)

This is another good application for music lovers which also requires rooted phone for its usage. This application enhances the music quality in different way of your android phone. Trust me it surely affects music quality of your phone. I am not talking about external speakers but it will surely improve music quality when you hear the music from your headphones. Just install this app and install its drivers from your phone and you can feel the magic. It can improve the bass effect a lot. It can also improve surrounding effect. You can set the ratio of all features from the settings. There are many other such applications (requires root) made by developers. But personally I enjoy this one most. I am sure the one who love the heavy bass effect during music will love this application. Don’t worry you can decrease it too. Have fun.

Greenify (Battery Booster):

This application has gain popularity in very short time. It provide most useful feature and it is battery saving on your android. I am sure all of you know how quickly battery drains in smart phones. Using this application you can hibernate all non wanted applications on your android device. Now what is hibernating application? In android phones even you close or exit any application, some of them will still keep doing back ground process and eat up your battery. Hibernating them means this application will make them sleep when you are not using them. Means they will not able to do any background process. Iphone is having this same functionality and we all know in iPhone battery stays more in compare to android phone. You can’t hibernate all apps as by doing hibernate apps like whatsapp, you will not receive messages until you open the whatsapp, so that’s why you can hibernate each app individually and you think that are not necessary to run in background. You can make exception for app like whatsapp. Now this application also requires rooted phone so that it can greenify apps when they are not on automatically. The new version of this app also support non rooted phone but you will not able to put application in hibernate mode automatically. You have to greenify all apps manually after to use them.

Wakelock Detector: (Detect background running apps)

This application also requires rooted phone to work. Let me tell you combination of this application and Greenify application (I mentioned above) is the best. Because this application keep watches on another application which keep doing their process/running background. Means this application will tell you which other applications are keep running in background and leaching your mobile battery. It will give you the list of the applications which are using your phone CPU and the one which are using the display unnecessarily when they are not on. That’s why I tell you that this application and Greenify app makes good combination. As you can make list of applications on the basis of this application and greenify them to put in hibernate mode.

Mobile Uncle Tools: (Install custom recovery)

This is another good tool which offers few good features for your android phones. Let me tell you, this app is more useful to those who love developing stuff on their android like installing custom ROMs and other stuff. First of all it can provide the complete device information to you including whole hardware. Sometime such information can be helpful to you in different ways. You can also explorer engineer mode of your android phone from where you can change settings of your phone. The most useful feature is that you can easily flash custom recovery on your android phone using this tool. You just need to put .img file on your SD card and using this tool you can install it directly. Using this application you can also backup your IMEI numbers and you can restore them back using the same. These all features can be used by people who do developing stuff with their phone.

So this is it. I guess I have explained many apps with very detailed information. For me many of them are very useful to me. And all of them offer very unique features which you can’t get with normal applications. So this may gives you good reason to root your android phone as well. Some functions and features are base on system files; you can’t use them unless you have access of system folders. That’s why rooting phone is important. So if you are not aware of advantages of rooting the android, then above applications give show you enough advantages for the same. Try yourself to know more about them. Have fun.

]]>padhiar_anand@yahoo.co.in (AKP)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23991
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23991These days almost every people are having their own smart phones. And among these phones Android is quite famous mobile operating system in compare to other mobile OS especially in India. These days I have also seen that people is having craze of changing new and new smart phones with latest features in very short time. In this case or any other way backing up your different kind of android data is an important and most required thing. If you are also changing your mobile phone frequently then it is important to take back-up of every important thing to your other phone like contacts, messages, photos, videos, app data and many more. So in this article we will learn about different ways of backing up our android data with different kind of useful applications.

Backup your applications: First people love to install different kind of games and applications on their smart phone. But every time they buy new phone they have to install their games and applications again from store using Internet. So this thing can eat up your internet data for the same apps and games again and again. But you can save your data by saving those applications apk files in your android phone or SD card of it. Just save your android apps apk files and next time even without internet you can download those applications and games directly from your phone or SD card. But you may have to update them to get latest current version if any updates available. The best application I have used for saving your application apk files is App Backup & Restore.

Backup using Titanium Backup: This is another good application to backup your applications on your SD card or your phone memory. But unlike above application I mentioned, this application need rooted android phone to work. Yes if your phone is not rooted then this will not work for you. As it required root access, it also serves better backing up features. The above application I mentioned only backups apk files of your applications. Means you can just re-install them. But using titanium backup you can also backup data of your current applications with apk files. All applications will be back up with their data. Means suppose you have reached to certain level in one game. After backing up that data when you restore your game with titanium backup you will get the game with those data (means save level where you left). So that’s a big plus point of this game. This application also having purchased version which offers you even more better features in compare to free one.

Backup your contacts: This is the most important one that you don’t miss your any important contact when you move to new phone. Many people backup their contacts on their SIM card which is also good habit. But what if they lose SIM card or their lost their phone in any case. And backing up contacts in phone memory is very bad idea. The safest way to backup your contacts is online. Your android phone is also having this facility. You can save all your contacts and synchronize them with your Google account. I am sure you all know that with Google our private data is very safe. Once you synchronize your contacts with your Google account, all of them will be stored online. Next time when you purchased new android phone you just have to add your Google account in it and all your contacts will be automatically feed in your new phone. So that’s a big advantage of saving contacts online.

Back up your SMS: Well, these days’ people more use apps like whatsapp. But there are still many who love to use normal SMS service in their phone. Whenever you go for new phone you have the fear of losing all your old SMS. But you can backup them too using certain app on your android. SMS Backup & Restore is one of good application using which you can easily backup your all SMS in just one click. All your SMS will be backup in your memory card and later on you just need to install this application on your new phone and using it you can restore all SMS in your new phone in one click. So now you don’t have to worry about losing important messages as you can backup them on your SD card with other things.

Store data online: You can also backup your important data like apk files and other things online. These days apps like Google drive and drop box provides fantastic feature to save your data online which is the most secure place than any other. You don’t need to store all your data online, but you can go for important one. All of them having their mobile apps and you can easily upload your stuff without transferring them to your pc.

Custom Recovery Backup: This is about developer things. One who love to install custom ROMs on their android phone should surely use this recovery backup before going for any new android custom ROM. Using custom recover you can backup whole android OS with all of your phone data in either SD card or your phone memory. So that supposes if you face any kind of problem with new android custom ROM you can revert back to your backup android version easily without any extra gadget like computer. Just restore it from your memory card using custom recovery mode and all back just like it was before installing new android custom ROM. This is not about purchasing new phone as you can’t use your backup on your new phone. This is just for developers who love to install new custom android ROMs.

So this is it. Now you are ready to go for new phone with all your backup data. You can easily transfer your different backup data to new phone by following any above methods. Any of these backup methods can come to very handy in different situations. Personally I used to change my phone very frequently so I guess I use most of the method for the same purpose. Among all of them titanium backup is my favorite app as it can also backup applications and games data so that I never need to start anything from starting. Check them out by your own and use it which you like. I am sure all of them will be handy to you as well.

Information technology (IT) evolves and transforms the entire world. Since, time immemorial race of human civilizations practices various methods to reduce the distance between places. Mode of communication enables all of us to reduce distance between faraway places and increase constant touch among known persons even if they are a long way away. It is the sheer human analogy to find out what has not been seen and this enables many new voyages in the past from west towards mysterious eastern side of the earth. Most of voyages had been through oceans which many courageous voyagers have taken the upper hand in facing imminent dangers and unknown tidal heights. They discovered many new places and repeal the phobia that the earth is a place and somewhere one can fall from there to alien space called universe. Slowly, realization comes to earth is a sphere and in no ways we can fall to empty space of the universe.

Human is a rational animal and cannot live without relationships. He cannot stay alone. He wants to create associations and collaborations and this creates urge to connect with others that have enabled multiple ways for humans to ponder upon newer reaches towards unknown entities. With the advent of computers more and more form of collaboration and coordination among different spheres of the world through different physical servers has become a reality. Many multinational companies (MNCs) are now interconnected in providing non-stop access to clients at different locations of the world due to installation of industrial servers at different locations. It empowers companies to manage information with a single click of a computer button and most orders, tenders, and catalogues of logistic management are now possible through industry servers.

Security protection model:

Clients publicly give out some private information to industrial server for identification and authentication of real persons. It is done to create a seamless relationship between client and industry. On the other hand, it is evident that these informations are vital and companies must ensure strict vigilance in order to obtain this information in a well-guarded manner. Many competitors of companies always want to lurk into such information of clients in order to steal business. Most times, market leader has to face the brunt of difficulties of stealing these data from industrial server. Database of market leader is always prone to attack from its competitors in two senses. In the first sense, the mode of attack is made to create more and more server downtime, in order to bring down percentages of time capture on similar services. In the second sense, industrial servers of market leaders are always attacked in order to steal information about clients and entangled market leaders in the legal battle over spreading of private informations of individuals.

In Europe it is legally binding for industries to protect the privacy of clients and individuals in the highest manner and this in modern times, security of industrial server has become a major preoccupation among in-house security specialists. Hackers and attackers employ advance evasion techniques (AETs) to simulate attacks on industrial servers through disguise of packet network correspondence. Security protection model of industrial server is an extremely important tool for attacks from different hackers. They know in order to gain administrator rights; they have to pass through different development evasion techniques through the process of invisible modules that has been ignored by in-house security specialists of industrial servers.

Threat landscape on traditional security models are potentially on rise:

Advance evasion techniques (AETs) break security protection model of most organizations. There are not any clear-cut formulae to stop such attacks and anticipate such attacks beforehand. Attacks of AETs are mostly towards traditional security models and gain the upper hand and completely stay invisible within the same set of network operations inside industrial servers. Given this rising of advance evasion techniques, threat landscape on traditional security models is potentially on the rise. More and more industrial servers who are employing traditional security model as their correspondence server have been under relentless attack from AETs. Traditional security models are facing threats from development evasion techniques because of heavy server side limitations of their functions.

Cybercriminals use AETs to employ covert and undetectable methods to penetrate deep into protected network systems. Legacy industrial servers run with traditional security model which is handicapped over attacks from advance evasion techniques which bypass traditional network models to invade deeper system configuration and overtake administrative control of industrial servers. Traditional security models of industrial server run with the practice of common network solutions. Common network solutions run with security devices, network firewalls, intrusion detection systems (IDS) and intrusion prevention systems (IPS). Many industrial houses do not possess sufficient knowledge about what kind of risks AETs represent to their business. Security professionals must update their knowledge and adapt to changing security dynamics. This writes up arms to observe the Internet from the point of view of cybercriminals to understand natural security situations from around the world. Traditional security systems run with layered security that constitutes of network router, hardware firewall and intrusion prevention system (IPS).

The internet is a wild world having no policing. Attackers and hackers have open and field to search for server vulnerabilities which are interconnected all over the world. Due to nature of business and other specifications, server of most of multinational companies (MNCs) is always online and there are many such public to private transactions going on from within their server. Even if an attacker and hacker are caught red-handed, there is no such aggressive international criminal justice system which can try to handle cyber criminals in a court of justice. Internationally, criminal actions performed by cybercriminals performed in internet perceived as a low-risk environment. Most of sentencing of cybercriminals in the international justice system are very low in character. Huge scales of potential rewards for hackers are still there.

Infamous conficker worm:

Most times, victims who have lost fewer amounts of money resulting out of hacking of bank account have less bothered to report to cyber police. They remain silent. Cyber criminals, try to steal few amounts from a large number of personal bank accounts which always gets unnoticed and unreported. Security professionals of industrial servers have a tendency to ignore such small attacks from hackers. Hackers try to initiate such progress evasion techniques to hide behind small attacks to manage and set for bigger attacks in future. Modern cybercriminals have become more industrialized, organized, sophisticated and enterprise. More and more black-hat professionals enter these businesses which are very well supported by numerous countries and big business houses. Big business houses take the help from hackers to look into classified informations of immediate competitors from the same business segment. Hackers initiate two kinds of attacks. One is network-based and the other is host-based. Advanced evasion techniques (AETs) concentrate on network-based attacks.

Attackers send targeted attack to industrial network server and try to intrude into targeted device and then remotely control it. Network security device is placed between attackers and industrial server which aim to provide security to industrial server from invading advance evasion techniques. For AETs targeted devices with compromise of laptop or enterprise servers. This is then proved that AET attacks are not limited to enterprise and industrial servers only. Most of modern attacks on AETs target specific enterprise resource planning servers (ERPS). Attackers target specific industrial servers through scanning of multiple network zones. The configure worm first detected in 2008, was a glaring example of how a simple evasion technique attacks renowned industrial servers worldwide and stays inside their server for so long invisibly sending vital information to rival camps. More old Windows server computer runs with the principle of remote procedure call request (RPC) which creates collaboration management remotely to different location servers.

Target device of attackers:

Conficker worm uses a specially crafted RPC, to force buffer overflow on network servers, to inject infected shell code on industrial servers. Buffer overflow condition is a condition related to exceed limits of network capacity within specified time limits. Infected shell injection controls the entire network of industrial server and stops inward as well as outward movement of network transactions. Conficker worm mute intrusion detection system (IDS) completely for some period, gives additional time to attackers for a completely vulnerable unmatched system in order to initiate attacks advance evasions techniques (AETs). According to Microsoft’s Security Intelligence Report from April 2012 at one time during 2012, 220 million computers worldwide were infected with conficker work for more than two years. Surprisingly, most of these systems were well secured with highly trusted security software from famous security software vendors were installed on them still all these systems were not well protected from imminent attacks of advance evasion technique (AETs). The preliminary task of hackers is tantamount to collect comprehensive collective information from information technology (IT) department from insiders. In this way, they garner the geographic location of a physical server which is the target device for hackers to attacks with advance evasion techniques. They get information from people who are working with inside company. There are a number of sources of information and hackers go for trial and error method to utilize all such gatherings of information.

The internet is a vast resource for gatherings of all sources of knowledge. Every company has internet presence and plenty of information regarding such companies can be collected from simple internet searches. Hackers dig up for more information about the target device from different sources. Hackers are very meticulous in their approach to this. They search for vulnerabilities within the targeted device. Hackers have sufficient knowledge about ongoing internet vulnerabilities cropping out from different unmatched operating systems and applications. Security experts in bigger organizations should use constant security audit of unsecured ports and susceptibilities in application architecture. Hacker collects most information about the target device and then decides which type of attack to be initiated in order to have complete control over administrative rights of targeted computer. Attackers then create their own code and send to target device through a reliable remote connection through simple command prompt from the computer. Security updates and patches are meant to protect industrial server from imminent attacks. In practice security patches create additional vulnerabilities.

Creating totally bug free software takes time:

Are there any methods to make totally bug-free software? Many developers feel creating totally bug-free software is still a myth. Making such server or huge software takes huge time. Generally, for every thousand of lines of codes you can have at least three bugs. Creating a totally bug free software takes huge time and there is not any such guarantee and there is no such full proof plan for this. Operating systems have million lines of code. An industrial server has unbelievable lines of codes that are out of human comprehension. Internal quality testing is not automated but done by some other professional as they are required to make mistakes. Microsoft releases service packs for updates to fix many bugs and security holes in codes of operating systems. In 2005, Toyota recalled 160,000 Prius hybrid cars following reports of unwanted and unwarranted warnings lights illuminating automatically for no reason stalling moving engine unexpectedly. From complete research, it was found that there is a bug in the operating system of smart car which was embedded to create greater smart environment from inside car. This illustrates how a perceived smart car which runs with some computing goes totally wrong to stop engines of cars completely. This proves that when a software code goes completely mistaken the corresponding hardware server also behaved in different manners. Bugs in codes of software can open the floodgates for hackers to intrude into the target system by means of attacks of AETs.

Daylight saving time:

There has been a misconception about the relation of hardware in consonant with the software environment. It is not the case at all. Every hardware works accordingly to the software environment and this environment is called as smart environment. Software controls hardware and entire hardware can be controlled with software environment. The problem arises when software has bugs or security holes. Bugs and security holes inside software architecture can allow back door entry through sophisticated advanced evasion techniques (AETs). Fixing of bugs by software vendors does not constitute an automated process. A team of developers always scans through vulnerabilities of software environment and then through process re engineering methods patch these critical security holes. Till to date, there is no single process and method to create an automated patching of security vulnerabilities in the software environment. A time window that exists between discovering a bug and coming up with solutions in deploying the fix on the server is known as daylight saving time. During this time, industrial server remains completely untouched and unattended. Hackers wait anxiously for this time and then initiate attacks on target servers. That is why many industrial servers run with different time zones, specifically time zones for US in order to minimize vulnerability time of servers.

Attackers invade codes for injections into industrial and productivity server to completely gain the upper hand in their functions. In simple term, daylight saving time is the time window that exists between discovering of bug, security holes in the software environment and reaching a solution and then installing that fix in the software environment. Security patches fixes immediately certain parts of industrial servers, but it also open several vulnerabilities which require constant patches and security updates. Patches fixes some part and in future breaks some other part and makes a continuous process of patching and updating industrial server. Security analysts must ponder upon different methods to look for such vulnerabilities at the earliest so that they can reduce daylightsaving time and create a completely secure operating system. In short, patches may introduce a new problem for the business software. Patches of business software is essential, but it does have side effects.

It is always difficult to patch critical production server:

Business software on productivity servers poses difficulty in installing scheduled patches. It is not easy to restart productivity servers at one go as it can cause a huge loss to the exchequer in terms of time, money and reputations. Big industries cannot be out of action for long as it can hamper brand values and remove loyal customers who have taken the status of companies so far due to constant backings from their side. This increases the time interval and gives ample time to attackers to initiate a series of attacks to production servers. It is always difficult to patch critical productions server such as industrial machine controller or nuclear reactor controller as one second of disturbance of such servers can result in some mighty technical faults. Advance intrusion prevention system (IPS) can temporarily fridge advance evasions techniques (AETs) initiated by attackers. IPS does not constitute a complete solution to wipe out AET attacks. IPS techniques adjust time interval of day light saving times thus gives security professional additional leverage to create a security patch and install those patches on vulnerable productivity and industrial servers.

Advance intrusion prevention system is a modern tool used by network security specialists to create virtual patching and layered patching. It minimizes daylight saving time in order to reduce buffer overflow resulting out of continuous attacks from development evasions techniques. Advance intrusion prevention system continues to scan the entire network and treat the entire industry and productivity server as a single unit in order to completely scan each factor of network movements. Advance intrusion prevention system also fails many times against imminent attacks originate from AETs. For this, it has become a serious issue concerning security of industrial server and productivity servers of large organizations. It is like, you are staying in a conflict zone and you have looked everywhere but failed to lock up the back door of where criminals enter into your house. AET is an invisible threat. It is developed by intelligent hackers.

Most of security invasions come out from dim internet protocol designing which originates from connectivity of network servers throughout the world. For better security, a robust internet protocol designing is needed. Internet protocols are often complicated process, creating out of hearty designing of internet security which stops evading advance evasion techniques. Internet protocols are important network connectivity solutions which are a gateway to different network connections to clients. There are some internet protocols which are difficult to manage and some are very rarely used by network servers.

Abstract and distracts methods of code injection:

Some system administrators use a moderate approach to even activities of unused network ports. Sometimes, concealment techniques implemented by attackers through attacks of development evasions techniques many a times go unnoticed due to careless attitude of system administrators. Advanced evasion techniques (AETs) successfully carry malicious codes to deliver deep into industrial server without detection. It creates new technology to hack into productivity servers at larger organizations. Sometimes, it combines so many techniques to create a hybrid technique to bypass several layers of network security. AET has ability to change the mode of attack during attacks on industrial servers thus creating a different dynamic evasion techniques which can change with nature of defense imposed on secure servers. Configuration of AETs depends upon such abstract and distracts methods of code injection that many a time’s secure servers are unable to detect and consider them as normal network flow within ports of internet protocols. Principle of advance evasion techniques (AETs) consists of three simple techniques such as insertion, evasion and denial of service (DoS). There are three simple techniques used to bypass devices for network security. AET provide sufficient space for attackers to change the detection techniques in case of apprehension of detection of attacks in midway from devices to network security.

It is evident that there are no such research papers for them to rely on it and for this they have to deal with these threats from their own intelligence. This creates an easier situation for attacks of AETs as they are now facing with network security which is still at its nascent stage. Even most of security vendors are now handicapped with this technology and they are creating own research and development (R & D) team to create an automated development evasion testing tool to protect network security products. Due to dynamic nature of AETs most of network security products cannot detect it while the attack remains in. Researchers have found about in understanding the mode and nature of advance evasions techniques (AETs), and more and more hidden evasions comes to light. It gives to show that for every protocol the nature of AET is different. That is why; it is always challenging to prepare a network defense against attacks of AETs as the mode of operations changes in every case. There is no standardizing AETs formula so that security professionals create an established defense system on it.

Automated advance evasion testing tool is still in its nascent stage:

In recent times, there are many development security firewalls as well as intrusion prevention system (IPS) to defend attacks on networks. This is an alarming situation and definitely doomsday for entire network security servers. This goes on show the response time of productivity server is too less to act. Two seconds to defend system and create and install a patch is difficult and for this many security farms decide to create a stealth method in order to fridge such imminent attacks for some time in order to get suitable day light saving time to install security updates within productivity servers. This situation is similar to the situation which existed 15 years ago to antivirus industries, where they knew about existence of large number of viruses but no one in the industry could spell out how extensive the problem was then. The scope of AETs is vast and it is important for security experts and network administrators to clearly understand what this is about and how this works.

Just imagine the number of different types of attacks of AETs can be with the principle of the binary number that has 147 digits to two, a truly humongous variety of potential combinations which is always difficult to guess for security professionals. AET work just like nanotechnology which constitutes on the principle of multiplication in order to create massive objects with numerous similar small instances. Latest research has shown that some of these AETs are so deadly and dangerous that they create their own defense system and work like a tiny industrial server while carrying out attacks on large industrial servers of big enterprises. It seems the only solution to this ever increasing network security problem is the automated advance evasion testing tool which can change its course of defense in accordance with nature of attacks originating from different unknown sources. Automated advance evasion testing tool is still in its preliminary stage and it requires huge research and development team with superior expertise to develop such tools.

Application processing information:

AET target traditional security devices. It does not purely depend upon protocol properties. Most security software runs with the principle of scanning networks and AETs work in a different manner. It can be invisibly open closed ports and there is no way security software is going to find such open ports. All these create worrying trends and it is a challenge for security professionals to learn and understand how AETs work. It is high time to think of some unusual combination of network attacks. AETs do not depend upon the usual combinations; it works with different unusual trends and protocol formations which security professional has to understand it better to know the nature of attacks on industrial productivity servers. AETs constantly attacks productivity servers through some unusual combinations. It exploits technical and inspection limitations of security devices through exploitations of memory capacity, performance optimization, and design flaws. Traditional network security is completely ineffective against attacks from advance evasion techniques in similar manner traditional radar are ineffectual against modern stealth fighter attacks. AET take advantages of weak protocol anomalies and violations. These vulnerabilities appear due to flawed implementation of commonly used internet applications and browsers. Network traffic works in layer principles and most protocol irregularities occur owing to flaws in these layers. Security professionals need to analyze discrete layers of network traffic layer by layer and manual detection and scanning of log files is a good option to detect signs of concealment of AETs from within network infrastructure.

This process of scanning entire network security is called as network traffic normalization and proper and intimate analysis of every fitting layer can produce revelations of any conceal malicious codes of AETs. The infamous Conficker worm is a simple code injection which stays invisibly inside Windows server computer by bypassing legitimate security software. When it is initially detected, it comes out openly that it stays invisible undetected creating more havoc all over. That is why Microsoft creates Windows 8 by completely overhauling security environments and connecting authentication processes to hardware application processing interfaces (APIs). Windows 8 depends so much upon hardware security than software security. Two factor authentication of Gmail are stronger and securer more with hardware authentication. Android phone is used as two factor authentication, mechanisms in order to give greater security to the gmail account.

A simple experiment of creating AETs worm:

There is some work around with some applications which can bring about 90 percentages of Gmail account open. This is worrying trend considering it is the primary email account for most users. Awaited to flexible and always on availability, it has slowly become ubiquitous email account for all of us. It is evident that hardware security is impossible to crack even by dynamic advance evasion techniques (AETs). Transmission control protocol or internet protocol (TCP/IP) network is built on sending and receiving of informations through packets. It is common to use lesser packets in order to increase the speed of transmission. As a result of this, fewer ports are utilized and rests of ports are remaining unused for most of the time. These unused network ports remain constant and most times security experts do not believe that about it as they perceive as no traffic communication is there and for this there should be no breach of security from these ports. Let us consider a small experiment where collect some conficker worm from a legitimate security web portals. In Internet, there are some sites which offer virus samples for testing and creating antivirus updates. You can get those samples for free for testing purposes.

Test it on an older or legacy desktop computer and do not test it on your innovative laptops as there are chances of getting infected while performing this experimentation. Now make two fragments of this conficker worm. Then send it to two separate networks meant exclusively for testing. Install updated security software on both network servers and do not forget to update its operating system with the latest security updates. What is reason for this not detection of these worms? Conficker is a form of advance evasion technique which works differently when introduced in the form of two separate identities and it goes on to show, how a known malwares changes its characteristics completely when it is divided completely. It is a smaller example how a single AET worm can change its characteristics when it is separated into two segments. Sadly, when it is changed this approach, network security devices will not detect this which results into completely hacking of productivity and industrial servers. From this example it is evident that, when advance evasion techniques segments worms into many different segments and then while in the process of attacks it also combines some segments to becomes some other form of malwares, is obviously the single most dangerous viruses attacks to server computers which many information technology (IT) specialists would never ever think about it.

Why are such robust network security devices always fail to predict and intercept these attacks?

Network security devices or server need to handle million of connections in a single second in some ports. It restricts connection to some ports due to security and speed. They can hold network traffics in memory for fewer seconds. The normal amount of memory allocated for the inspected traffic is about seven seconds per each connection. Then, that connection goes into a phase of time out and then it is deleted from server’s memory. In the above conficker example, two fragments are sent each to two different network servers within the space of ten seconds. Deliberately the time interval between two servers is being kept longer considering default amount of memory allocated for the inspected traffic is about seven seconds per connections. In the first seven seconds the network device will partially match two fragments and then it will leave the inspection on those connections. As both worms are releasing in ten seconds apart, then it cannot match the entire configuration of the network and are able to complete a positive match to the detection fingerprint inside network security devices. Within time frame of seven seconds the conficker worm will reach in some parts and in scanning those parts, network security will find nothing as it cannot wait for ten seconds, and it will pass this worm as legitimate traffic to network in legacy server systems.

Network security packets inspect many packets coming out from different networks from different internet protocols coming out from different servers throughout the world, and after a few seconds it stops detecting longer traffic and that is why rise of such vulnerability exists in legacy servers. That is the reason why the introduction of hardware firewall and hardware intrusion detection system can work tirelessly scanning innumerable network communications without any disturbances. Windows 8, Android and Apple are built-in consonant with distinctive hardware vendors to stop attacks of advanced evasion techniques (AETs). Hardware Intrusion prevention system (IPS) works differently. It can store a huge flow of traffic information and the trend of buffer overflow does not impact on it as this can create multitasking in its supreme form to scan different network traffics through TCP/IP. It constantly scans for stored internet protocol for longer time to detect any sign of attacks of AETs. When, fragmented-conficker worm comes near to hardware security, it slowly keeps that information and then scans it in the first part and then bridge it in the second part in order to make a complete safer network security. It creates an event log of the server, and early warning which ensures automatic conversions of administrative rights of the server to standard rights where such attacks of advanced evasions techniques will simply evade from the scenes.

Enhanced mitigation experience toolkit from Microsoft:

In its latest version of Windows, Microsoft introduces, new incarnation of enhanced mitigation experience toolkit (EMET), which anticipates the most common form of invisible attacks from advance evasion techniques (AETs) by stopping additional vulnerabilities in computer systems, and diverts and block indicating those techniques. Virtually, every product has to deal with software vulnerabilities and exploits. Results of attacks from AETs can be catastrophic malware infections or loss of personal identification information (PII). There are heavy chances of the loss of business data which can incur heavy losses to overhaul financial health of an organization. EMET performs continuous through scanning of entire network traffic searching for any signs of vulnerabilities. Most of intrusion prevention system (IPS) and data execution prevention (DEP) require separate installation of application to implement the program. If that application is hacked then entire purpose of IPS and DEP has gone into astray. EMET from Microsoft which is free for Windows server is especially useful for software where patches and security updates are not available. It is also handy for obsolete software where the source code is not available. It works on dynamic principle just like attacks of AETs do.

It works in reverse-reengineering manner to eliminate any trace of invisible attacks. EMET provides security specialists a horde of choices to work on with such as divide each process with a different level of mitigations. In information technology, mitigations are expected paths of attacks from AETs where, achievable frame rate of network transmission is considerably reduced. Numerous productivity servers are reluctant to remove legacy applications because; they pose easiness to clients while dealing with front end databases. Legacy applications are those applications which are no longer supported by their developers. In some cases, developers die then that application is otherwise known as legacy applications. In some case, companies disown those applications after a certain period of development. Windows XP is currently a legacy operating system. It is no longer supported by Microsoft. Legacy applications cannot be rewritten and it is required to phase out from the scheme of things slowly. Big organizations cannot instantly retire legacy applications as there are certain pecuniary as well as other issues are attached to it. Unfortunately, such applications can pose heavier security risks by showing software vulnerabilities. EMET can help to harden such application and makes it difficult for hackers to find attack point in industrial server. EMET helps security specialists to help and verify fraudulent SSL certificates to stop recurring attacks of AETs. EMET enforces stringent sort of SSL certificates for specific domains to allow configurable certificate pinning. EMET works differently from further intrusion prevention systems. It does not require a third party installation. It does not prescribe constant updates. Installation file of EMET is small and it is fast and works silently in the background helping system administrators immensely. It provides cutting edge mitigations technologies against modern cyber attacks. It comes from Microsoft and it mixes well with a Windows server. The release cycle of EMET is not associated with any product. It can work seamlessly with legacy windows server such as Windows media editions as well as it can work brilliantly with the latest version of Windows server which works diligently with hardware security measures. EMET is a set of toolkit to protect server and individual networked computers by creating a set of several pseudo mitigation technologies to counter attacks on development evasion techniques (AETs). EMET give security professionals a free hand to construct the system policy of mitigation on a per executable basis.

EMET employs hardware logic of signature matching:

EMET supports mitigation for system processes, per executable processes, configured applications, and provides a certificate of trust constantly updated and synchronized with the cloud of Microsoft servers. SSl certificates are designed to bind specific rules with root certificates of servers to observe and report any discrepancies in server activities. EMET does use light system resources, and does not function as a process. It runs behind the scene through application compatibility framework of Microsoft. There are absolutely no compatibility issues attach with EMET but sometimes some exceptions here and there. High voluminous network traffic with too less memory is always vulnerable to network attacks from AETs. Modern network security devices are running with 64-bit architecture in order to distribute more memory to server while dealing with network transmissions. It gives additional room to security experts in dealing with continuous attacks from network servers. Many industrial networks sacrificed speed over network security. All four layers of TCP/IP protocols of devices are not inspected properly and it poses additional vulnerabilities and creates target point for attackers. All traditional network security servers work on the principle of signature-based inspection of virtual packets known as pseudo-packets. When all four layers of TCP/IP are enabled, it makes network communications slower but it considerably improves network security and the entire productivity server of organizations.

It is difficult to redesign older security devices into newer ones as it is unique for every organisation and the entire process of redesigning take a huge chunk of time. Most organizations have their unique identity and redesigning of each organization is different and it requires huge investment of financial resources for research and development (R & D) in order to build a superior infrastructure. Normally, research and development (R & D) takes time and it requires massive investment. That is for this reason that still to date most organizations have been unwillingly to update their legacy systems. In an industrialized business environment, proper combination of newer hardware requirement compatible with modern security software takes lesser central processing unit usages (CPU) and a lesser strain on the entire server. This results and empowers server to watch out for the entire network infrastructure without lack of any such extra memory usages. In this way, it closes on exploits and locking patterns and then moves towards a seamless security environment. Due to high-end CPU capacity, industrial server can work with data stream based information mechanisms, each network packets of the entire network infrastructure can be thoroughly verified and inspected. Due to introduction of hybrid software and newer software-offload technologies lesser load on CPU provides an environment to reduce stress of entire processing units. In this way, most of these attacks on AET which aim to destroy outdated security installations fail to exploit signature based inspection mechanisms. It implements hardware logic of signature matching and it connects to enterprise cloud security in order to stay updates all the times. Owing to presence of cloud security, latest updates are received by the server and then they utilize those updates to stop exploits from attacks of AETs.

Cybercriminals like to utilize minimal methods and fewer seconds to execute attacks on advance evasions techniques (AETs). They prefer cut-down approach as they are not certain of which industrial server they will be hacked into and they constantly try to hack server day in and out in order to locate security vulnerabilities. They knew, to have lesser time as these vulnerabilities are about me be patched sooner and for this they attempt to execute their attacks through buffer overflow and dynamic evasion techniques. AET is a difficult technique and for cyber industries, it is always a challenging to hire such black hat professionals as they demand huge money and people with big brains and time usually goes with this in order to create such massive attacks of advance evasions techniques on industrial and productivity servers of large organizations. Cyber industries expect to incur huge benefits from attacks of AETs and that is how they invest huge money on cyber professionals. Owing to the advent of entire information technology (IT) network infrastructure, the role of industrial control system is always important and it has more significance as it categorizes administrative responsibilities.That is the reason why industrial control systems are always been potential target zones for an attacker as they knew if they succeed in overpowering this system then simply they can control the entire productivity server of an organization. In simple, attacks of AETs employ conventional attack system and does not rely too much on complicated hacking methods. Organizations that are sincere in maintaining their server of installing security updates and scanning entire networks zones are far more secure and attack of AETs can need to be done to their servers.

Most of time such attacks are possible due to limited exposure of cyber security professionals and for this it is relevant for these professionals to gain more knowledge about basic end to end point security and try to implement such security measures from within infrastructure of industrial security set up. Every organization is at risk of attacks from hackers. No organization is risk free. Organizations such as government, banking, and critical infrastructure are at higher risks from attacks of hackers. Non-profit, local and service industries are at lower risk of attacks from cybercriminals. However, when these services go for financial, commercial and political value offerings to organizations, then they face the most serious brunt of attacks of AETs. In modern times, numerous such attacks are meant to satisfy ideological ambitions of some organizations. For this, many countries have invisible support to such hackers and have been spending a huge sum of money in order to develop newer technologies associated with AETs. Hi-tech, media and retail industries have an intermediate probability of onslaught of advancing threats. Many security software vendors have tried hard to develop programmable logic controller (PLC) for automated detection of attacks on advance evasions techniques (AETs). Modern industrial servers go for hardware PLC. Hardware PLC is secure than software PLC. Software PLC can be hacked if attacks of advance evasion techniques performed from a remotely located hardware dashboard.

Server overload and denial of service (DoS) attacks:

It is difficult to have fully automated detection of attacks on advanced evasion techniques as there is no standard rule set of how malwares work in a certain way before executing and injecting attacks. Many industrial as well as productivity servers are now protecting themselves with hardware security coupled with extensive scale all round layered security cover. If the system administrator goes on with signature based approach, it would be awkward for him to detect the sheer amount of different combined attacks of AETs. This is where the problem increases and due to non recognition of signatures, network infrastructure of industrial server simply by passes all these informations and then attacks of AETs become successful. Human mind has limitations and it cannot perform beyond certain levels and for this it is essential to devise some other forms of detection mechanisms to counter such massive floods of informations within the fewest possible of time. That is why traditional signature based approach would be unimaginable to think owing to massive buffer overflow of informations causing server overload and denial of service attacks. Modern security professionals use network normalization techniques which encrypt entire network traffic and decrypts on user’s recommendations. There is no need for signature based approach as entire data is unreadable even after hacking. Modern security professionals use network normalization techniques which encrypt entire network processes and turns them into a single homogenous network units thus it creates a stronger server presence in front of imminent attacks on advance evasion techniques (AETs). Attacks of AETs come to advance persistent threat (APT) to hide their original intentions to perform successful attacks on targeted devices. It is the duty of security experts to identify and trace routes of advance persistent threat and foils such attacks before they are totally encapsulated.

Conclusion:

By identifying APT, security experts can encrypt access of critical system paths completely. In layman’s language, AET is nothing but a simple set of identification tools for cyber criminals to hide their attacks. More and more industries are being digitized and due to rapid growth of industrialization and digitalization of data, attacks of AETs pose serious challenges and threats to industrial servers which always aim at creating always on connectivity options for clients. Traffic normalization techniques reveal actual traffic and detect bots and AETs and send malicious traffics to spam zones. It keeps real traffic and sends and encrypts them and sends clients decrypt key in order to protect data all over through transfer zones. It needs extreme technical proficiency and expertise on the part of security professional to detect and destroy attacks of AETs completely by employing robust rules of traffic normalizations. Security experts’ deal with traffic normalization techniques on industrial server gives full administrator rights to deal with entire network infrastructure of industrial servers. Network administrators should always stay agile and alert and should constantly scan network traffics and from time to time should provide a suitable security environment for industrial server. It reduces the chances of attacks of advanced evasion techniques by limiting generation of a number of multiple signatures based authentication systems.

]]>mohanmekap@gmail.com (mohan manohar)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23859
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23859Information technology emerged in several fields like software development, business process outsourcing, knowledge process outsourcing, etc. In order to finish the tasks quickly, every company is designing and developing software for their needs, they are using the software provided by leading Information technology companies that have got much-improved technological software. For this, a huge sum is needed if the system is followed. Today, open source technologies help several companies to develop their own product by using their products without cost. Several open source products are available in the market, but Lamp Linux stands in the top. The Linux, Apache, Mysql and Php are included in lamp Linux. Since the lamp, Linux is developed under open source technology, anybody can get any sort of support from any users all over the world.

Linux is an operating system through which anyone can develop apache, mysql and php. In the word Lamp, "L" denotes Linux, which is an operating system "A" indicates Apache, a web server, "M" stands for mysql, which is a database server and finally "P" denotes php used for application development.

Today Lamp Linux is largely used by most of the companies due to its popularity in developing enterprise level products. After installing the Linux operating system you can download the tar files for apache, mysql, php from the website in order to edit the source code and develop it, in accordance to the needs. It can download separately or may be integrated by using the tool "XAMPP.". It may be seen from the above that anyone without any sort of difficulty could operate by using lamp Linux and get success in developing the products without any hurdles and also make one to connect the world easily.

It is quite necessary to have the system always updated in order to keep stable and reducing our worries much about the mal wares and viruses. The chance of attack by viruses is less if lamp Linux is followed when compared to windows operating systems. So, now-a-days, almost all companies prefer the usage of lamp Linux.

Linux is an operating system which includes several packages and by installing it; you can do the tasks effectively and efficiently.

While Linux booting the system, there are seven levels are involved namely post, bios, MBR, grub, kernel, INIT, and run levels. Post tells the bios what are the hardware required for booting the system. Bios loads all the driver software detected by post. MBR reads the first sector of the hard disk where a boot loader lies. Grub is a boot loader, which is used to select the operating system of your choice, when installing two or more of them. Kernel loads the module depends on the hardware configuration, and initialization invokes the INIT process. INIT refers to corresponding INITTAB file and boots the system depends on the default run level were set in it.

Every Linux file system is managed by the root user because he is the system administrator who has full rights to control to whom he should provide access and deny.

The Linux kernel controls all the hardware device drivers and assigns appropriate modules. Defaults on static modules are loaded, and they are also called as monolithic kernel and dynamic kernel called as a modular kernel. All kernel logs are stored in "/VAR/LOG/DMESG" to know further about kernel errors. If you have the backup copy of your kernel, you can restore it in case of kernel panic error occurs.

If you want to share a file or printer among windows's users, the concept of samba will help you. You can configure samba file in "/ETC./SAMBA/SMB.CON." After your configuration in Linux, you can check, if it has correctly shown by using 'TESTPARM' command.

Within a Linux system if you want to share a file, you can use NFS, which is called as network file system and "/etc./exports" file for configuration. You can view the exported directory by using the command "SHOWMOUNT -e" and checks all files using to mount -a command.

Apache is used in all web applications created under Linux because it is the web server and uses the port no 80 to show the running process of HTTPD daemon. You can configure it by using the command "/ETC./HTTPD/CONF" and to run all pages under it in the path named "/VAR/WWW/HTML.". Using the command "HTTPD -t" you can check the configuration information, "HTTPD -S" for virtual hosting information and add modules depending on the needs. Using the "access_log" file you can retrieve the apache hit counts, and if you want it to be showed in charts in a graphical manner, use the WEBALISER tool.

Mysql is known as a database server which stores all information in the back end. You can absolutely store and retrieve the data freely by using mysql queries. All database information is stored under the directory called "/VAR/LIB/MYSQL.". It uses the port number 3306 and the service under "/ETC./INIT.D/mysql" will be executed.

You can create dynamic web pages using php, and the module for apache is a mod-php, and its configuration file lies under "/ETC./HTTPD/CONF.D/PHP.CON." You can create powerful web application with the help of php using its coding techniques, and also you can create complex scripting, which leads to manage Linux application. Using the "php.ini" file you can check your configured information and make it possible changes to take effect.

By using all lamp Linux concepts efficiently you can build secure, powerful and stable web applications.

]]>testingsamp@gmail.com (Dwarakanathan)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23855
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23855Technology helps mankind in several ways. Anything you can buy by sitting in the comfort of your home if you had an email id. Email helps to communicate to other persons about our thoughts, suggestions and share the knowledge. Several companies are providing email ids. You just register on their site and get your own personal email id. One of the most famous companies that provides email client, browser is Opera. You can get your own account by registering in the opera community.

Tabbed browsing concept was introduced by the opera browser with additional search engine based search window, which gives the result quicker than any other web browsers. By using the new account wizard you can easily create your opera account. Once you opened the account you can access opera email, RSS feeds, and newsreader. After registering in the opera site by giving your name, email id, username and password you will get the opera email client. The opera email client which is used to send and receive you messages from different recipients. You can also import your outlook or thunderbird mails to opera.

The opera email client opens the mail panel which consists of send and receive, expand (>>) and a compose button. When you click the mail tab button, your inbox messages are shown quickly. You can also compose messages by giving the recipient address in the To, CC, BCC headers by clicking the compose button. You can see the sent messages in the sent folder, and if you want to delete a file permanently you should do it by selecting the files in the trash folder and give to delete.

Whenever a new message comes it will not be shown automatically. So you can press the send/receive button so that all emails which are unused will be downloaded to your opera email client using the IMAP protocol. The opera email also provides you the facility against spammers to send unwanted mails to you when you put the recipient address in the spam list.

The opera email features are below:

Opera consists of computer and mobile version email clients. You can go to any page using the page number given in the opera browser from your Mobile. It also provides RSS feed to read news letters through computer or Mobile.

The opera email provides various features like gestures, Turbo, speed dial, link, customization, zoom, mail, widgets, search and content block. In opera, you can put the tab bar in top, bottom, side of a page.

Opera email checks the spelling automatically and avoids the error mistakes. You can download torrent applications using an opera web browser without downloading any third party torrent software.

Opera email affected by spam is less comparing with other web browsers, and you can filter your search depends upon date, recipient address and category. Opera email loads quicker because it uses the java scripts for its process.

Speed dial tells you can access in a single click of your favorite sites.

Security's bar provides the safety measure which is keeping our data secure from others accessing through the browser using cookies.

Gestures allow to quick the task by performing the mouse actions quickly.

Link allows you synchronize data among the computer that are interconnected through the internet, and zooming enables the site viewable at a different type of size that suits as per the resolution of the systems.

The opera email bar provides the mail-related functions like composing, filtering, searching and content blocking of unnecessary intrusions through pop up blocking.

Though it seems to be slow when compared to other web browsers and email clients and not attract mass it would become popular in the feature as per the sayings "Slow and steady win the race."

]]>testingsamp@gmail.com (Dwarakanathan)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23848
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23848When you hear grievances from individuals who've taken a stab at starting a new business online and fizzled, chances are that its not that their endeavors were wrong, they simply weren't polishing powerful web showcasing. This is the place large portions of the web promoting focus and projects you can buy fizzle the normal specialist. They give a prologue to diverse ways you can push your business on the web, yet they just go that far and stop. They don't give in profundity data about how to tweak these procedures to make them work for you, and what to do in the event that they don't appear to be working.

There's one and only genuine mystery to powerful web showcasing: Reevaluate regularly and change strategies when vital. Most wellsprings of data you'll discover on web promoting urge you to attempt numerous diverse models of advancement. Conventional ads, pay-for every click promoting, website streamlining, joint wanders and a mixture of other great recommendations for approaches to get your item or administration out before the individuals who would need or need it. So you're acquainted with all these different methods for advertising. At that point numerous individuals believe that is all the data they require, so they hop in with both feet, blow their financial plan on pay-for every click publicizing or some other extravagant advancement. The thinking is that the benefits produced using this advancement will supplant the stores used and even expand them for the following promoting fight.

Tragically, it once in a while works simply along these lines. Regularly an individual will put these showcasing procedures into impact at the same time trusting for a substantial return, yet rather next to no happens and now there's little plan left to attempt once more. While there's nothing off with promoting crusades that cost, in the same way as pay-for every click showcasing, this sort of advancement isn't ideal for each business, regardless of what the master may say. What's more its scarcely successful web promoting to begin with pay-for every click using.

Where most fall flat is that they don't painstakingly screen the reaction of each kind of promoting they have set up. Compelling web promoting isn't carried out once and overlooked, abandoned to work the scenes to create immense benefit. It's a developing process, one that takes customary alteration and change to be genuinely fruitful. Furthermore you truly can start this procedure without using a whole lot cash, and some of the time without using anything whatsoever.

Go for the lower expense types of showcasing first. Article promoting, case in point, and filling an online journal with crisp essential word improved substance to pull in great internet searcher positioning successful web advertising and an incredible begin. Yes, you'll need to improve your web substance, regardless of the fact that you have pay somebody to do it effectively.

Anyway hold off on the extravagant pay-for every click fight until you see which watchwords and which articles and blog entry are alluding you the most clients. At that point put your cash where your clients are, basically, by making a pay-for every click fight focused around results you've as of now seen with different systems. Viable web promoting obliges you to reconsider the majority of this regularly, in light of the fact that your best pivotal words can change even from normal.]]>rekhagargmba@gmail.com (Rekha Garg)Computers & Technologyhttps://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23788
https://www.boddunan.com/topics/computers-and-technology.html?view=article&id=23788Net Banking is quite common and an important banking feature in current days. Using net banking you can surely save lots of time by doing all those transactions from your computer which generally you can do by visiting bank. You can transfer money, pay bills, do online shopping, check balance and many more using the same. So there are lots of benefits of it. But still many people think that net banking is not safe and can harm your money via hacking and other related stuffs. True, it is not 100% safe but for which thing you get such full assurance. Yes it can be risky if you not follow some basic safety majors but if you follow them properly and follow all those steps which are important for keeping your account safe then you can use it without any problem. I am using net banking facility since 7 years, I have done many transactions using it like online shopping, money transfer, etc. and so far I have never faced any problem related to security. So it is good facility if we know how to use it properly. Let’s talk about all those concerned things which should be keep in mind if you are also using the net banking or thinking about to use the net banking.

Tips for using Net Banking

Choose a strong password: First thing is to set the password for your net banking account. Make sure that you are using strong enough password which cannot be predicted by anyone, even by your family members. It should be known only to you and should not be not easy like your birth date or mobile number which can be guessed by anyone. So make sure that you are using a strong enough password like mixing numbers with letters. Keeping password with only letters or only number is counted as easy password, so don’t do that and choose strong password but choose it properly so that you can remember it later on. Lol.

Never type password publicly: Publicly means whenever you login to your account make sure that you are not typing your password in front of any unknown person or person on whom you don’t trust more. Net banking is an important thing so that you should understand about its importance, you can’t just type password in front of anyone, that unknown person can check out your password and that can be problem for you later on. So make sure that you are typing it privately so that no one can see it.

Change your password regularly: This is also an important thing. You should keep changing your password regularly. So that even if someone knows it or hacks it, by changing it regularly you can keep your account safe from such attacks. You should fix a certain time interval for changing your password like once in a month, it is a good habit to keep your account safe and to keep your password safe from others.

Use more Authentication features: These days social sites and email sites are providing more authentication processes than just a password. For example, before logging in to your account they provide you some kind of pin to your registered mobile number, so after entering that pin only you can open your account. Now even banking sites are providing such higher protection authentication process for your net banking account. If you are having such features on your banking site then it is more preferable to use it too than only single password.

Never login from unknown or public computer: This is most important thing when you are using net banking for your bank account. You should only use your net banking account on your personal computer. I have seen that many people use net banking on cyber cafe in a hurry when they are outside and not having their computer with them. But let me tell you this is a bad habit and can be dangerous for your net banking account. Any public computer may have installed some malicious software on it which can hack your password in it; same thing goes for any unknown computer. That’s why I am saying that better to be safe and only use it on our personal computer. No matter what, it is better to avoid unknown computers and public computers for Net banking. You should make it a practice.

Never share your details: You should never share your net banking details or account related details with anyone. Not only offline but also online. I mean to say you may get many phishing mails for asking your net banking details. For example some fake banking mails may come to you for asking your password and some other personal details. Never share password or any personal detail to such mails without confirming about it with your bank. Banks never ask such details on email. So be aware of this thing and never share your personal details with any unknown person and also on online.

Use paid antivirus and keep your computer virus free: It is important to keep your computer clean from any kind of virus and spyware. Virus and other malicious things can certainly affect net banking process and it may lead to hack your account. So it is better to use best and licensed antivirus if you are depend on net banking facility more. You can even use free antivirus but paid thing will serve you more and give you more security obviously. Other thing is always keep updated antivirus. These days new and new virus found by hackers, so better we update our antivirus regularly to stay safe from them.

Don’t forget to logout from your account: I have seen many people that don’t use to logout their different accounts like from social sites or email account. Let me tell you net banking is not like checking social sites and emails, it is very important thing in compare to them. You should always logout your account immediately after you complete your work on it. Without logout it may raise problems to you. So never forget to logout from your net banking account after you complete your work with it.

Open bank site by Bank site URL: Many people use search engine to open links and different sites. But better you not follow the same for net banking site. It is better you directly write your net banking site URL on browser and open it directly. You should also not use email links which redirects you to your net banking site. This may not sound more risky to you but sometime it can be very risky to you if you by chance redirected to wrong and fake site of your banking site. So be careful with it.

Stay alert from Phishing mails: I have already told you about it. You may get many phishing mails which will ask you about banking details and net banking password to complete some kind of tasks. Never fall for this thing. Even you get mail which is very similar to bank mail I will advise you to not to open any kind of link from mail. You can check things directly from your banking site by typing its URL directly into your browser. Some phishing mails may come with your bank name and it look exactly same as your banking mails, but never fall for it and give any kind of personal details. I already told you that mostly bank not ask any kind of personal details and passwords via mail.

Online shopping via net banking: If you are doing any kind of online shopping using your net banking account. Then better you go for genuine online shopping sites which are old and reliable. You should never use your net banking account with any new or unknown site which may lead to you with some kind of problem later on. They can hack your account with given details and then just disappear from the online world. So better you do all necessary investigation about the site with which you are using your net banking account.

Keep checking your account: Even if you are following all the safety majors you should check your account activity regularly. It is not necessary but it is a good habit. By this way you can make sure about all transactions done by you with your account. So you can also track any improper activity going on with your account by this way. So just decide regular interval of time for checking your account activity and keep doing it on regular base.

So this is it. I have mentioned about all the points which I came to know about with my experience so far with net banking. I am sure this will be helpful to those who want to start with the net banking feature and worried about security related to it. Just follow them properly and keep checking your net banking account activity on regular basis, I am sure you will be safe without any problem. So be safe and have fun.